Ethereum 2.0 is not yet online, and fraudsters began to defraud users' funds

Recently, a carefully designed fraudulent website appeared on the Internet, which claimed to provide "Ethereum 2.0 PoS mining" service, and some investors have been cheated and began to deposit funds.

In addition to adding some technical elements, this scam is a very simple Ponzi scheme. Fraudsters require Ethereum holders to send funds (quantities ranging from 0.2 ETH to 1024 + ETH) in order to obtain incredibly high returns.

Ethereum 2.0 is not yet online, and fraudsters began to defraud users' funds

(This picture shows the amount of funds deposited and the corresponding rate of return)

Fraudsters use almost all PoS terminology. They wrote on the website that the mysterious "PoS mining" is a lifetime investment opportunity:

"Most blockchains that use the PoS algorithm can pledge tokens. But usually you cannot make full use of your funds. The funds you pledge must remain connected for 24 hours. Even a temporary connection error will affect the possibility of making money Sex because of the need to re-queue. "

With their service, you only need to pledge your coins (ie sent to a so-called Ethereum PoS account), and then wait for regular returns. If this is true, then it is more like a form of DPoS, because the fraudster did not mention sharding, slot, epoch, and initial pledge funds (32 ETH), which are all the conditions necessary to run Ethereum 2.0.

In addition to being economically useless, this project also has too many "danger signs".

1. Ethereum 2.0 is not live. All predictions about its launch date are made before the outbreak of the new crown epidemic, so its real launch time may take at least 1 year.

2. At present, there is no staking activity in Ethereum 2.0. The existing Ethereum network only supports the PoW mechanism, and transactions are processed by miners, not stakers.

3. No cryptocurrency can guarantee investors an annual return of 100%. The average annual return of PoS is around 14.5%.

4. This scam misleads users by posting relevant links to the developers of the Ethereum Foundation. For example, the GitHub source code for this scam is actually from Ethereum.org.

5. The fraudster lied that MyEtherWallet's "donated" address belongs to himself, and the balance of this address is 400 ETH.

Unfortunately, these fraudsters require users to "confirm" their URL via email and two-factor authentication, so they may steal large amounts of sensitive data.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Policy

Babbitt Column | US Prosecution Investigative Exchange and Precautions

(For more details, see also Deng Jianpeng, Sun Penglei: “Intermediary Chain Supervision and Compliance Respons...

Blockchain

Interview with BitMax.io Cao Jing: Compliance, Localization and Traffic Integration, Exchange Status and Future

On October 19th, at the 1st anniversary of the BitMax.io exchange, Jingwei China Partner Harry, Sequoia Capital Partn...

Blockchain

Being shot, being controlled, and being exiled globally, is the founder of the exchange the most dangerous occupation in the currency circle?

A week ago, Tobias Niemiro, the co-owner of Bitmarket, Poland's second-largest cryptocurrency exchange, was shot...

Blockchain

FCoin nearly 13,000 BTC can not be paid, some people report it, some people save themselves

Following the destruction of 720 million tokens and three days and three announcements, FCoin has made new progress. ...

Blockchain

"Gemini" Risk Control Interview: How the Traditional Financial Regulatory Framework Maps to the Crypto Industry

Source: Yahoo Fiance Original author: Daniel Kuhn Translator: Moni Source: Odaily Planet Daily How does Ruixing'...

Blockchain

Why do I always receive "Exchange Withdrawal" messages? Learn about the classification and protection measures of Web3.0 data leakage events in this article.

This article will introduce you to the classification of Web3.0 data breaches and what measures we should take to pr...