All
FAQ
Announcements
Product documents
How can you protect yourself from a phishing attack?
They're also known for sending out the phishing link via SMS, accompanied by a message that requests the targeted user to upgrade their identity verification level, which leaks their account info to the phishing link. Once the account password and other information is leaked, the assets in the user account will be quickly transferred away.3. How can you prevent phishing attacks? Don't click on unknown links and log in to unsafe websites to avoid account and password disclosure and asset losses.Published on Aug 17, 2023Updated on Mar 3, 2026FAQ3,688What can I do if my device is running in an unsafe environment?
It's important to know that having a rooted device can increase your susceptibility to viruses, system instability, and privacy leaks. Android devices do not enable root by default. If a device is rooted, malware could exploit the root privileges to attack the system, creating unnecessary security threats. For this reason, when the OKX app detects that your device is rooted, you will receive a security prompt to help prevent the loss of assets.What should you do?Published on Jan 19, 2023Updated on Feb 12, 2026FAQ298OKX CeFi Annual Report 2023 announcement terms and disclaimers
OKX disclaims all responsibility for data leaks or consequences arising from third parties acquiring the data through any means. By default, users who browse and review the annual report have read and understood the terms and disclaimer of the report . This annual report doesn't constitute or shall not be considered a recommendation to deal in any products or investment advice.Published on Dec 29, 2023Updated on Nov 17, 2025Announcements1Zero-Knowledge Proofs: what are zk-STARKs and how do they work? (zk-STARK V1)
Since the leaves of the Merkle tree are hashes, none of your private information will be leaked to others.How do I verify? 1. To verify if the asset balance of your account has been included as a zk-STARK Merkle leaf, log in to your OKX account, visit "Audits" to view recent audits, select Details to view your audit data 2. Get the data you need for manual verification by selecting Copy data 3.Published on May 10, 2023Updated on Sep 8, 2025FAQ179What's a dusting attack?
Off-chain anchors: Deposits to exchanges (with identity verification), public donation addresses, or leaks can tie a cluster to a real person.How do I counter a dusting attack? For most cryptocurrency users, being a victim of a dusting attack is unlikely. Hackers tend to target wallets that own a substantial amount of crypto. Even so, everyone should take steps to protect themselves from such an attack. While unlikely, there's always a possibility of an attack occurring.Published on Oct 4, 2024Updated on Mar 3, 2026FAQ13
Showing 1-5 of 5 articles