社交工程已成為加密貨幣生態系統中最主要的威脅方式,利用人類心理而非技術漏洞來破壞安全。與傳統針對軟硬體弱點的網路攻擊不同,社交工程是透過操縱個人,誘使他們自願洩漏敏感資訊或採取危害自身資產的行動。
區塊鏈不可竄改的特性更讓這類風險大幅升高——資金一旦被轉移,幾乎不可能追回。 高知名度事件如2025 年 2 月 Bybit 遭駭案,導致高達 15 億美元損失,凸顯這類心理攻擊的毀滅性影響。
2024 年 Chainalysis 報告顯示,社交工程占加密貨幣竊盜的 73%,總計 32 億美元資金被竊。
隨著機構採用速度加快以及散戶湧入市場,了解社交工程手法並採取有效防範措施,已成為無論個人持有者還是主要交易所的迫切任務。
本文將深入探討心理基礎、進化手法、重大案例及新型防禦措施,共同對抗加密貨幣領域最持久的威脅。
加密貨幣社交工程攻擊的心理學基礎
社交工程攻擊利用人類決策過程中根深蒂固的認知偏誤與情感誘因。在加密貨幣這一領域,這些心理弱點因幾個關鍵原因尤為突出:
利用恐懼、緊急性與貪婪心理
攻擊者巧妙引發目標的情緒反應,從而繞過理性思考。製造恐慌的手法如「帳號即將被凍結」或「偵測到可疑活動」等,讓受害者進入應激狀態,判斷力下降。2024 年史丹佛行為經濟學研究發現,在感受到時間壓力時,加密用戶洩漏敏感資訊的機率比對照組高 320%。
貪婪同樣是強烈動機,尤其加密市場波動劇烈,易生暴富或一夜歸零的心態。假投資機會鼓吹高額回報,利用行為經濟學所謂的「錯過良機焦慮(FOMO)」。2024 年的「去中心化金融夏季 2.0」騙局就充分展現此狀況,偽造高年利率收益,誘使受害者連接錢包到惡意合約。
技術複雜性即弱點
區塊鏈系統本身的複雜度為社交工程創造了溫床。2025 年加密貨幣教育聯盟調查發現,64% 的用戶無法正確解釋私鑰管理,78% 難以分辨合法合約互動。知識落差讓多數人易遭冒充技術支援的詐騙。
Bybit 遭駭時,北韓 Lazarus Group 不是直接針對交易所員工,而是攻擊了一家享有高權限的第三方數據分析公司。該組織偽造緊急協議與看似專業的技術語言,連資深開發人員都難辨真假,最終取得關鍵憑證,引發上億美元失竊。
文化與意識型態因素
加密圈強調去中心化與自我主權,反而帶來某些漏洞。這些價值提升個人自主與隱私,但同時也讓集中式驗證機制難以發揮。
匿名文化盛行——開發者與意見領袖常以化名活動——使假冒攻擊層出不窮。2025 年初的「藍勾勾」Discord 攻擊案,駭客精準模仿知名開發者帳號,宣佈假的空投活動,導致 4,200 多組助記詞被蒐集。
加密貨幣社交工程的演進攻擊手法
隨著產業發展,社交工程手法在複雜度、規模與目標性上不斷升級。掌握這些演進攻擊方式,對於形成有效防禦至關重要。
進階釣魚行動
釣魚詐騙仍是最常見的社交工程手法,根據美國 FBI 2024 年資料,占加密詐騙超過 70%。傳統的 email 釣魚演進為多管道、組織化的行動。現代加密釣魚常見手法包括:
- 利用 SSL 憑證的域名偽裝:製作視覺完全相同並有 HTTPS 加密的網站,利用同形異字或筆誤域名。
- 攻陷廣告帳戶:Google 威脅分析團隊指出,2024 年針對虛擬貨幣的釣魚廣告在搜尋引擎花費約 1,470 萬美元,導向偽造平台登入頁。
- 瀏覽器擴充功能冒名:2025 年 Chainalysis 發現,仿冒 MetaMask、Trust Wallet 等錢包的惡意瀏覽器外掛,騙走約 4,500 萬美元。這些工具常出現在官方瀏覽器市集,利用平台信任度行騙。
- 逆向社交工程:高明的攻擊者不直接索資,而製造受害者主動求助的情境。例如 2024 年的「Gas Error」攻擊,假冒交易錯誤提醒誘使用戶前往假「除錯工具」,進而竊取私鑰。
客製化冒充與情報蒐集
除了一般「客服」騙局,現今攻擊者還會在社交媒體和論壇進行精細情報蒐集,針對目標客製化話術。區塊鏈分析公司 Elliptic 指出,2023 年至 2025 年,針對性冒充攻擊增長 340%。
這類攻擊常從 Reddit、Discord、Telegram 等論壇潛伏監控起,專門找尋反映錢包或交易所問題的用戶,隨後主動聯繫,並提出與對方狀況高度相關的資訊,營造可信印象。
例如有用戶反映交易失敗,攻擊者會主動引述具體的錯誤訊息與交易哈希,聲稱能提供「專業協助」並要求連接錢包。
透過社交攻擊向智能合約下手
DeFi 蓬勃發展帶來全新攻擊表面。比起直接盜取帳密,現今高級攻擊多透過誘騙用戶簽署惡意交易或批准危險合約權限。手法如:
- 權限無上限授權:以混淆界面讓用戶授予代幣無限制操作權限,未來任何時刻均可能致資產被清空。
- 假空投需「領取」交易:利用限時空投製造緊張感,當用戶與合約互動即執行惡意程式碼。
- 仿冒治理提案:假冒協議治理投票誘使用戶簽署實際轉移管理權限的交易。
2025 年 1 月 Curve Finance 前端遭劫持時,駭客暫時掌控 DNS 設定,把用戶導向偽造界面,要求批准看似例行交易,實則給予駭客無限提款權。
重大案例與數據影響
分析重大社交工程案件有助於理解攻擊手法、組織弱點和系統性衝擊。這些案例不僅展現攻擊複雜度,也暴露對全生態鏈的連鎖反應。
Bybit 供應鏈攻擊事件
2025 年 2 月 Bybit 遭駭,為加密史上規模最大社交工程案。攻擊者非直接針對交易所,而是鎖定一間擁有高權限的第三方分析公司。
攻擊團隊精心安排假身份耗時數週建立關係,最終以偽造法律緊急情境逼迫開發者授予遠端存取權,取得連接 Bybit 的憑證,最終導致 50 萬顆以太幣、約 15 億美元流失。
事件揭示供應商管理的嚴重缺口。資安公司 Mandiant 事後報告顯示,84% 大型交易所缺少嚴謹的第三方安全驗證,卻極度依賴外部廠商維運核心設施。
2024 Coinbase SMS 騙局
除了大型平台遭駭,較小規模但廣泛傳播的攻擊,影響更多散戶。2024 年初,一場策畫周密的釣魚行動,透過簡訊仿冒 Coinbase 2FA 提醒,成功觸及估計 230 萬位用戶。
攻擊手法複製 Coinbase 官方雙重驗證警示,發送偽造... sign-in notifications that directed users to convincing replica sites. Despite Coinbase's robust internal encryption standards, the human element - users hastily approving fake 2FA prompts - enabled the theft of approximately $45 million before detection systems identified the pattern.
登入通知將用戶引導至極具說服力的仿冒網站。儘管Coinbase具備嚴謹的內部加密標準,但人為因素——用戶匆忙批准偽造的雙重驗證提示——使得駭客在偵測系統發現異常模式之前,就成功竊取了大約4,500萬美元。
What made this attack particularly effective was its behavioral targeting. Analysis showed the SMS messages were timed to coincide with significant market volatility periods when users were likely to be checking their accounts anxiously, creating the perfect environment for bypassing rational scrutiny.
此攻擊特別有效的原因在於其行為瞄準策略。分析顯示,這些簡訊的發送時機正好配合市場劇烈波動的時期,使用者通常會焦慮地頻繁檢查帳戶,形成繞過理性檢查的絕佳環境。
Cumulative Economic and Geopolitical Impact
累積經濟與地緣政治影響
The financial scale of social engineering in cryptocurrency extends far beyond individual incidents. According to Chainalysis, social engineering attacks resulted in $3.2 billion in direct theft during 2024 alone, with state-sponsored groups (particularly North Korea's Lazarus Group) responsible for 47% of major attacks.
加密貨幣領域中社交工程的金額規模遠遠超出單一事件。根據Chainalysis的資料,僅2024年透過社交工程造成的直接盜竊就高達32億美元,其中國家支持的組織(尤其是北韓Lazarus集團)佔主要攻擊的47%。
These funds finance a range of illicit activities with broader societal consequences. UN Panel of Experts reporting indicates that North Korea's cryptocurrency theft operations directly fund weapons proliferation programs, including the development of intercontinental ballistic missiles. The U.S. Treasury Department estimates that cryptocurrency social engineering has become the primary funding mechanism for sanctions evasion by multiple state actors.
這些資金為一系列非法活動提供了資助,帶來更廣泛的社會性後果。聯合國專家小組報告指出,北韓透過加密貨幣竊盜直接資助武器擴散計劃,包括研發洲際彈道飛彈。美國財政部則估計,加密貨幣社交工程已成為多個國家行為者規避制裁的主要資金來源。
Even beyond direct theft, social engineering creates significant second-order economic effects. A 2025 MIT Digital Currency Initiative study found that major social engineering incidents typically trigger 8-12% market-wide sell-offs, temporarily destroying billions in market capitalization as confidence erodes.
即使不談直接竊盜,社交工程還會帶來重大的二次經濟效應。2025年MIT數位貨幣倡議研究指出,重大的社交工程事件通常會引發8-12%的市場整體拋售,隨著信心瓦解,市值短時間內蒸發數十億美元。
Comprehensive Mitigation Strategies
全面防範策略
Defending against social engineering requires a multi-layered approach combining human awareness, technological safeguards, and institutional policies. The most effective defense frameworks address all three dimensions simultaneously.
防範社交工程需要結合人員意識、技術防護與制度政策的多層面方法。最有效的防禦框架必須同時涵蓋這三個面向。
Human-Centered Defense: Education and Awareness
以人為本的防護:教育與意識提升
User education forms the first line of defense against social engineering. Effective training programs should focus on:
使用者教育是社交工程防護的第一道防線。有效的訓練計畫應著重於:
-
Recognition training: Teaching users to identify red flags like artificial urgency, unsolicited contact, grammatical errors, and unusual requests. Simulations that expose users to realistic phishing attempts have proven particularly effective, improving detection rates by up to 70% according to a 2024 Cryptocurrency Security Consortium study.
-
識別訓練:教導用戶辨識出人為急迫感、不明聯繫、文法錯誤與異常要求等警示訊號。2024年加密貨幣安全協會的研究發現,透過模擬實際釣魚攻擊,能使用戶的偵測率提升達70%。
-
Procedural safeguards: Establishing clear internal policies that make verification routine. For example, Kraken's security guidelines recommend a mandatory 24-hour delay on any unusual withdrawal request, allowing emotional responses to subside before action.
-
程序性保護措施:建立明確的內部政策,讓核實程序成為日常。例如Kraken的安全指引建議對異常提現請求強制24小時延遲,讓情緒反應有時間平復後再行動。
-
Community verification systems: Leveraging community resources to validate communications. Legitimate projects now typically sign official announcements with verifiable cryptographic signatures or post simultaneously across multiple established channels.
-
社群驗證系統:運用社群資源來確認資訊真偽。現在正規項目多會以可驗證加密簽章發佈官方公告,或在多個既有主流頻道同步公告。
Major exchanges have recognized education's importance in mitigating risk. Binance reported investing $12 million in user education programs during 2024, while Crypto.com implemented mandatory security workshops for employees, reducing insider vulnerability to pretexting attacks by an estimated 65%.
主要交易所已認可教育在降低風險上的重要性。Binance於2024年報告投入1,200萬美元於用戶教育計畫,Crypto.com則對員工實施強制安全工作坊,據估成功將內部人遭假冒攻擊的風險降低了約65%。
Technological Countermeasures
技術性防護措施
While social engineering exploits human psychology, technological safeguards can create multiple layers of protection that prevent successful attacks from resulting in asset loss:
雖然社交工程利用人性弱點,技術防護則可建立多重保護層,防止成功攻擊導致資產損失:
-
Hardware wallets with air-gapped signing: Physical devices like Ledger and Trezor require manual verification of transaction details, preventing automated theft even if credentials are compromised. A 2025 analysis found that less than 0.01% of hardware wallet users experienced social engineering losses compared to 4.7% of software wallet users.
-
隔離簽章的硬體錢包:Ledger、Trezor等實體設備需手動確認交易細節,即使認證資料被盜也可防止自動竊盜。2025年分析顯示,硬體錢包用戶遭社交工程詐騙率不到0.01%,遠低於軟體錢包用戶的4.7%。
-
Multi-signature architectures: Requiring multiple independent approvals for high-value transactions creates distributed security that remains robust even if individual signers are compromised. Institutional adoption of multi-signature setups has grown 380% since 2023, according to on-chain analytics.
-
多重簽章架構:高額交易需多人獨立批准,分散安全風險,即使其中一人被攻破整體制度仍具韌性。鏈上數據分析顯示,自2023年起機構採用多簽設置增加了380%。
-
Time-locked withdrawals: Implementing mandatory delays for large transfers provides a critical window for fraud detection. Exchange-level adoption of tiered withdrawal delays has reduced successful social engineering attacks by 47% according to data from crypto insurance provider Nexus Mutual.
-
時間鎖定提款:對於大額提領設立強制性延遲窗口,讓詐騙偵測有關鍵時間。據加密保險商Nexus Mutual數據,交易所層級分級提款延遲已讓成功社交工程攻擊減少47%。
-
Behavioral biometrics: Advanced systems now analyze typing patterns, mouse movements, and interaction styles to identify compromised accounts, even when correct credentials are provided. Post-implementation data from exchanges deploying these systems shows 82% successful prevention of account takeovers.
-
行為生物識別:先進系統可分析鍵盤輸入、滑鼠動作與互動風格,識別遭盜用的帳戶,即使密碼正確也能攔阻。交易所部署此系統後的資料顯示,82%帳戶盜用事件成功被防止。
Institutional and Industry-Level Approaches
機構與產業層級做法
Broader ecosystem solutions can create collective defense mechanisms that reduce social engineering vulnerability:
更廣泛的生態體系解決方案可建立集體防護,降低社交工程風險:
-
Verified communication channels: Industry-wide adoption of cryptographically signed announcements prevents impersonation attacks. Protocols like ENS have introduced verification standards that definitively link on-chain identities to communication channels.
-
驗證過的通訊管道:全行業推廣加密簽章公告防止冒名攻擊。像ENS這類協議引入驗證標準,將鏈上身份確實連結至官方溝通管道。
-
Zero-trust frameworks for organizational security: Implementing least-privilege access controls and continuous authentication, rather than perimeter-based security models. The Bybit attack's root cause - a compromised vendor with excessive access - highlights the necessity for companies to adopt zero-trust principles.
-
零信任組織安全架構:採用最小權限和持續認證,而非傳統邊界式安全。Bybit攻擊事件肇因於第三方供應商擁有過多存取權限,凸顯企業必須落實零信任原則。
-
Cross-platform threat intelligence sharing: Real-time sharing of social engineering indicators allows rapid response across the ecosystem. The Crypto Security Alliance, formed in late 2024, now connects 37 major platforms to share threat data, blocking over 14,000 malicious addresses in its first six months.
-
跨平台威脅情報共享:即時交換社交工程徵兆,促使生態體系快速應對。2024年底成立的加密安全聯盟已連結37個主要平台共享威脅數據,半年內擋下超過14,000個惡意錢包地址。
-
Regulatory frameworks with industry input: Though controversial in some segments of the community, targeted regulation focused specifically on social engineering prevention has shown promise. The European Union's 2025 Digital Asset Security Directive requires exchanges to implement social engineering awareness programs and provides limited liability protections for platforms that meet specific security standards.
-
結合產業意見的監管機制:儘管於部分社群具爭議,針對社交工程防範的專門監管已有成效。歐盟2025年數位資產安全指令要求交易所必須推行社交工程意識培訓,並對符合理安標準的平台給予有限責任保護。
10 Essential Protection Tips for Cryptocurrency Users
加密貨幣用戶十大必要防護守則
Individual vigilance remains critical regardless of technological and institutional safeguards. These practical steps dramatically reduce social engineering risk:
無論科技及制度如何強化,個人警覺性始終關鍵。以下實用行動可大幅降低遭社交工程詐騙風險:
-
Implement mandatory self-verification delays: Establish a personal rule to wait 24 hours before acting on any unexpected request involving account access or asset transfers, regardless of apparent urgency.
-
強制自己執行延遲確認:無論對方多急迫,所有涉帳號或資產異動的意外請求,強迫自己至少等候24小時再判斷。
-
Use separate "hot" and "cold" wallet infrastructure: Maintain minimal balances in connected wallets, with the majority of holdings in cold storage that requires physical access and multiple verification steps.
-
熱、冷錢包分流:連線錢包僅存最少資產,主要持有量置於離線冷錢包,轉出需實體設備與多道確認。
-
Verify through official channels independently: Always independently navigate to official platforms rather than clicking provided links, and confirm unusual communications through multiple established channels.
-
自行查證官方管道:永遠自己輸入官網網址,不點擊他人提供的連結,遇可疑訊息應跨多個已知官方渠道查證。
-
Enable all available authentication methods: Implement app-based 2FA (not SMS), biometric verification, and IP-based login alerts where available. Exchange accounts with full security implementation experience 91% fewer successful attacks.
-
啟動所有可用認證工具:優先使用應用程式雙重驗證(非簡訊),如可支援則加開生物辨識和登入IP警示。全方位防護的帳戶,受到攻擊的成功率減少91%。
-
Regularly audit wallet connection permissions: Review and revoke unnecessary smart contract approvals regularly using tools like Revoke.cash or Etherscan's token approval checker. Many wallets retain unlimited approvals that represent significant risk vectors.
-
定期審查錢包連接權限:使用Revoke.cash、Etherscan等工具定期檢查、取消多餘的智能合約授權,因多數錢包預設無限通行權,潛藏極大風險。
-
Maintain dedicated hardware for high-value transactions: Use a separate device exclusively for financial operations, reducing exposure to malware and compromised environments.
-
大額交易用獨立裝置:重要操作專用一台硬體設備,減少惡意軟體與環境被入侵的風險。
-
Customize anti-phishing security codes: Most major exchanges allow setting personalized security codes that appear in all legitimate communications, making phishing attempts immediately identifiable.
-
設定個人化防釣魚密碼:多數主流交易所可自訂安全碼,所有官方訊息皆會包含密碼,假訊息即刻露餡。
-
Implement whitelisted withdrawal addresses: Pre-approve specific withdrawal destinations with additional verification requirements for new addresses, preventing instant theft even if account access is compromised.
-
啟用提款白名單:唯有事先核准的地址可領款,新增地址須經進階驗證,即使帳戶被盜也無法即時轉移資產。
-
Use multi-signature setups for significant holdings: Implement 2-of-3 or 3-of-5 multi-signature arrangements for valuable long-term holdings, distributing security across multiple devices or trusted individuals.
-
大額長期持有採多簽:對重要資產部署2/3或3/5多重簽名,把安全分散至多台設備或多位信任者。
-
Treat all unsolicited offers with extreme skepticism: Remember that legitimate opportunities rarely require immediate action, and extraordinary returns typically signal extraordinary risk. Apply heightened scrutiny to anything that seems unusually profitable or urgent.
-
對所有主動上門的邀約極度懷疑:牢記真正的機會極少要求馬上決定,異常高報酬往往代表高風險。任何異常吸引人或緊急的資訊都應提高警覺。
The Future of Social Engineering Defense
社交工程防禦的未來
As cryptocurrency adoption accelerates, both attack and defense methodologies continue to evolve rapidly. Several emerging technologies and approaches show particular promise in the ongoing security arms race:
隨著加密貨幣採用率提升,攻防手法都在迅速演化。多種新興科技和方法被認為在這場資安軍備競賽中特別具有潛力:
AI-Driven Threat Detection and Prevention
AI驅動的威脅偵測與防護
Machine learning models trained on historical scam patterns now power increasingly sophisticated defense systems. These AI systems can:
訓練於歷史詐騙模式的機器學習模型,現已成為越來越精密資安防禦系統的核心。這些AI系統能夠:
-
Detect anomalous wallet interactions: Identifying transaction patterns that deviate from established user behavior, flagging potential compromise in real-time.
-
偵測異常錢包互動:即時識別偏離用戶慣常操作的交易行為,標註潛在遭入侵風險。
-
Filter suspicious communications: Analyzing messaging across platforms to identify psychological manipulation patterns characteristic of social engineering attempts.
-
過濾可疑訊息:分析全平台通訊內容,找出社交工程常見的心理操縱模式。
-
Validate visual authenticity: Detecting subtle inconsistencies in spoofed websites or applications that human users might miss.
-
驗證視覺真實性:識別偽造網站或應用程式內人類易忽略的細微不一致處。
However, attackers have begun leveraging generative AI to craft hyper-personalized phishing content, escalating the technological arms race. The emergence of voice cloning technology presents particularly concerning implications for impersonation attacks targeting high-net-worth individuals and
然而,攻擊者也開始運用生成式AI製作高度個人化的釣魚內容,使科技軍備競賽升級。語音克隆技術的出現使假冒高資產人士的攻擊風險更加值得關注,並且……institutional key holders.
機構金鑰持有人。
Decentralized Identity Solutions
去中心化身份解決方案
Blockchain-based identity verification systems may eventually provide robust protection against impersonation attacks. Projects like Civic, Polygon ID, and Worldcoin are developing cryptographically verifiable credentials that could enable trustless verification without centralized vulnerability points.
基於區塊鏈的身份驗證系統最終可能為防止冒名攻擊提供強大保護。Civic、Polygon ID 和 Worldcoin 等專案正在開發可密碼學驗證的憑證,讓驗證過程無需信任第三方,且不會產生集中化的弱點。
These systems typically combine zero-knowledge proofs with biometric verification, allowing users to prove their identity without exposing personal data. Such approaches align with cryptocurrency's core ethos of self-sovereignty while addressing critical security challenges.
這些系統通常結合零知識證明與生物識別驗證,使使用者能在不揭露個人資料的前提下證明自身身份。這種方式既符合加密貨幣自我主權的核心理念,也有效解決關鍵的安全挑戰。
Cultural Evolution Toward Security-First Thinking
向「安全優先」思維的文化演進
Perhaps most fundamentally, combating social engineering demands a cultural shift within the cryptocurrency ecosystem. The community's early emphasis on rapid innovation and frictionless experiences often inadvertently deprioritized security considerations. Leading protocols are now actively working to reverse this trend:
或許最根本的是,對抗社交工程攻擊需要加密貨幣生態圈發生文化轉變。社群早期過度強調快速創新與無阻力體驗,往往不知不覺地將安全重要性擺在較低的位置。如今,主流協議正積極致力於扭轉此一趨勢:
-
Normalizing verification delays: Establishing waiting periods as standard practice rather than emergency measures.
-
將驗證延遲常態化:把等待期設為標準作業流程,而非僅限於緊急措施。
-
Developing common security certifications: Creating industry-recognized standards for both individual and institutional security practices.
-
推動通用的安全認證:制定產業共認的個人與機構安全標準。
-
Integrating security education into onboarding: Making security awareness training a prerequisite for platform access, particularly for DeFi protocols.
-
將安全教育納入導入流程:將安全意識訓練作為平台進入門檻(尤其是針對 DeFi 協議)。
Final thoughts
最後想法
Despite technological advancement, social engineering represents an enduring challenge precisely because it targets the most complex and adaptable component of any security system: human psychology. As cryptocurrency systems themselves become increasingly resilient to direct technical attacks, malicious actors will continue focusing on manipulating the people who control access.
儘管科技持續進步,社交工程之所以是持久的難題,正是因為它針對了任何安全系統中最複雜且善於適應的部分——人類心理。隨著加密貨幣系統本身對技術攻擊更具抵抗力,惡意行為者將更傾向於操控那些掌握存取權限的人。
The irreversible nature of blockchain transactions creates uniquely high stakes for these psychological battles. While traditional financial fraud might be reversible through institutional intervention, cryptocurrency theft through social engineering typically results in permanent loss.
區塊鏈交易的不可逆性,讓這些心理攻防戰的風險變得格外高昂。傳統金融詐騙還可透過機構介入加以挽回,然而加密貨幣因社交工程而失竊時通常會導致永久損失。
This reality demands continuous evolution in both individual awareness and collective defense mechanisms. By combining technological safeguards with psychological resilience training and institutional best practices, the ecosystem can significantly reduce its vulnerability to manipulation.
這樣的現實,要求個體意識與集體防禦機制必須持續進化。透過結合科技防護、心理韌性訓練與機構最佳實作,整個生態系統將能大幅降低遭操控的風險。
As Vitalik Buterin noted following the Curve Finance frontend hijacking: "The greatest challenge for cryptocurrency isn't building unbreakable code - it's building unbreakable people." In an industry predicated on trustless technology, learning to navigate human trust relationships securely remains the critical frontier.
正如 Vitalik Buterin 在 Curve Finance 前端遭劫持事件後所說:「加密貨幣最大的挑戰不是寫出無法破解的程式碼,而是培養無法被擊垮的人。」在這個建立於無須信任技術之上的產業,如何安全應對人與人相處中的信任問題,仍舊是最關鍵的戰場。

