All
FAQ
Announcements
Product documents
How can you protect yourself from a phishing attack?
They're also known for sending out the phishing link via SMS, accompanied by a message that requests the targeted user to upgrade their identity verification level, which leaks their account info to the phishing link. Once the account password and other information is leaked, the assets in the user account will be quickly transferred away.3. How can you prevent phishing attacks? Don't click on unknown links and log in to unsafe websites to avoid account and password disclosure and asset losses.Published on Aug 17, 2023Updated on Mar 3, 2026FAQ3,688How do I secure my MPC wallet?
All the 3 secret codes will be reset to secure your asset and prevent the risk of Share 2 data being leaked. It'll not affect your wallet address or your assets.Published on Aug 22, 2023Updated on Nov 17, 2025FAQ417How do I manage BRC-20 assets in OKX wallet? (app)
If they are lost or leaked, your assets may be at risk of being stolen. Please make sure to back up your seed phrases and private keys properly and keep them secure at all times. 2. How to import a BTC wallet? If you already have a BTC wallet, you can import it into the Web3 Wallet using a seed phrase or private key. Open the Web3 Wallet, select Wallet management > Add wallet > select Import wallet, then enter your seed phrase or private key to complete the import. 3.Published on Aug 22, 2023Updated on Feb 12, 2026FAQ1,487What can I do if my device is running in an unsafe environment?
It's important to know that having a rooted device can increase your susceptibility to viruses, system instability, and privacy leaks. Android devices do not enable root by default. If a device is rooted, malware could exploit the root privileges to attack the system, creating unnecessary security threats. For this reason, when the OKX app detects that your device is rooted, you will receive a security prompt to help prevent the loss of assets.What should you do?Published on Jan 19, 2023Updated on Feb 12, 2026FAQ298OKX CeFi Annual Report 2023 announcement terms and disclaimers
OKX disclaims all responsibility for data leaks or consequences arising from third parties acquiring the data through any means. By default, users who browse and review the annual report have read and understood the terms and disclaimer of the report . This annual report doesn't constitute or shall not be considered a recommendation to deal in any products or investment advice.Published on Dec 29, 2023Updated on Nov 17, 2025Announcements1Zero-Knowledge Proofs: what are zk-STARKs and how do they work? (zk-STARK V1)
Since the leaves of the Merkle tree are hashes, none of your private information will be leaked to others.How do I verify? 1. To verify if the asset balance of your account has been included as a zk-STARK Merkle leaf, log in to your OKX account, visit "Audits" to view recent audits, select Details to view your audit data 2. Get the data you need for manual verification by selecting Copy data 3.Published on May 10, 2023Updated on Sep 8, 2025FAQ179What's a dusting attack?
Off-chain anchors: Deposits to exchanges (with identity verification), public donation addresses, or leaks can tie a cluster to a real person.How do I counter a dusting attack? For most cryptocurrency users, being a victim of a dusting attack is unlikely. Hackers tend to target wallets that own a substantial amount of crypto. Even so, everyone should take steps to protect themselves from such an attack. While unlikely, there's always a possibility of an attack occurring.Published on Oct 4, 2024Updated on Mar 3, 2026FAQ13
Showing 1-7 of 7 articles