Slow fog alert: Bitcoin wallet Electrum "updates phishing" currency theft continues.
The Electrum team has also been developing other features. Electrum Wallet users can view the full release notes here.
Dynamic . . . Electrum wallet attacked nearly 250 bitcoins were stolen.
Use Google Authenticator to set up two-step verification.
This update prompt is not an official act of Electrum, but a phishing attack by an attacker that exploits a message flaw on the Electrum client and the ElectrumX server, which requires the attacker to deploy the malicious ElectrumX server in advance, and the malicious server is localized by the user's Electrum client (because the Electrum client is a light wallet and the user needs the ElectrumX server to broadcast the transaction). At the time of the madness, malicious ElectrumX servers accounted for as many as 71% of the total, and according to incomplete statistics, hundreds of bitcoins have been stolen in this phishing attack over the past year or so.
This isn't the first time electrum has appeared in a fake version. In December, nearly $1 million of BTC was stolen when hackers developed a fake encrypted wallet, Electrum. 1 this year.
Dash Electrum 126.96.36.199 was released, renamed Dash-Electrum, adding the option to use Tor Proxy at startup, according to Dash Coin. DASH is now trading at $159, down 3.26 percent.
This is also the BCH fork, the CSW camp's main rhetoric, they claim to return to the original white paper on the definition of BTC, BCHSV into a real "point-to-point electronic cash", the name of BCH. In the end, the war against BTC was launched to subvert the "already crooked" BTC.
EUR / USD, GBP / USD, BRN / USD and BTC / USD June 2 live entry point.
According to the slow fog zone, the Phishing attack by Electrum forged upgrade tips has stolen at least 200 BTCs, and this attack cannot be avoided by upgrading Electrum alone, requiring the entire ecological service to make corresponding changes (because Electrum is not a full node, and then on the transaction broadcast and the corresponding server has a message communication, the attacker can also deploy a malicious server)