💥 Gate 廣場活動:#发帖赢代币FLK 💥
在 Gate 廣場 發布與 FLK HODLer Airdrop、或 Launchpool 相關的原創內容,即有機會瓜分 200 枚 FLK 獎勵!
📅 活動時間:2025年10月15日 18:00 – 10月24日 24:00(UTC+8)
📌 相關詳情:
HODLer Airdrop 👉 https://www.gate.com/zh/announcements/article/47573
Launchpool 👉 https://www.gate.com/zh/announcements/article/47592
活動合集公告 👉 https://www.gate.com/zh/announcements/article/47586
📌 參與方式:
1️⃣ 在 Gate 廣場發布原創內容,主題需與 FLK 或相關活動(HODLer Airdrop / Launchpool)相關;
2️⃣ 內容不少於 80 字;
3️⃣ 帖子添加話題:#發帖贏代幣FLK
4️⃣ 附上任意活動參與截圖。
🏆 獎勵設置(總獎池:200 FLK)
🥇 一等獎(1名):50 FLK
🥈 二等獎(3名):25 FLK / 人
🥉 三等獎(6名):12.5 FLK / 人
📄 注意事項:
內容必須原創,禁止抄襲或刷量;
獲獎者需完
‘Pixnapping’ Android attack could expose crypto wallet seed phrases
A newly discovered Android vulnerability enables malicious applications to access content displayed by other apps, potentially compromising crypto wallet recovery phrases, two-factor authentication (2FA) codes and more.
According to a recent research paper, the “Pixnapping” attack “bypasses all browser mitigations and can even steal secrets from non-browser apps.” This is possible by leveraging Android application programming interfaces (API) to calculate the content of a specific pixel displayed by a different application.
This is not as simple as the malicious application requesting and accessing the display content of another application. Instead, it layers a stack of attacker-controlled, semi-transparent activities to mask all but a chosen pixel, then manipulates that pixel so its color dominates the frame.
By repeating this process and timing frame renders, the malware infers those pixels to reconstruct on-screen secrets. This, fortunately, takes time and limits the attack’s usefulness against content that is not displayed for more than a few seconds.
One kind of particularly sensitive information that tends to stay on screen for much longer than a few seconds is crypto wallet recovery phrases. Those phrases, which allow full, unchecked access to the connected crypto wallets, require users to write them down for safekeeping. The paper tested the attack on 2FA codes on Google Pixel devices:
While a full 12-word recovery phrase would take much longer to capture, the attack remains viable if the user leaves the phrase visible while writing it down.
Related: UK renews Apple iCloud backdoor push, threatening crypto wallet security
Google’s response
The vulnerability was tested on five devices running Android versions 13 to 16: the Google Pixel 6, Google Pixel 7, Google Pixel 8, Google Pixel 9 and the Samsung Galaxy S25. The researchers said the same attack could work on other Android devices since the exploited APIs are widely available.
Google initially attempted to patch the flaw by limiting how many activities an app can blur at once. However, the researchers said they found a workaround that still enables Pixnapping to function.
According to the paper, Google rated the issue as high severity and committed to awarding the researchers a bug bounty. The team also reached out to Samsung to warn that “Google’s patch was insufficient to protect Samsung devices.”
Related: Best crypto hardware wallets for 2025
Hardware wallets offer safe protection
The most obvious solution to the issue is to avoid displaying recovery phrases or any other particularly sensitive content on Android devices. Even better would be to avoid displaying recovery information on any internet-capable device.
A simple solution to achieve just that is to use a hardware wallet. A hardware wallet is a dedicated key management device that signs transactions externally to a computer or smartphone without ever exposing the private key or recovery phrase. As threat researcher Vladimir S put it in an X post on the subject:
Magazine: ‘Help! My robot vac is stealing my Bitcoin’: When smart devices attack