💥 Gate 广场活动:#发帖赢代币FLK 💥
在 Gate 广场 发布与 FLK HODLer Airdrop、或 Launchpool 相关的原创内容,即有机会瓜分 200 枚 FLK 奖励!
📅 活动时间:2025年10月15日 18:00 – 10月24日 24:00(UTC+8)
📌 相关详情:
HODLer Airdrop 👉 https://www.gate.com/zh/announcements/article/47573
Launchpool 👉 https://www.gate.com/zh/announcements/article/47592
活动合集公告 👉 https://www.gate.com/zh/announcements/article/47586
📌 参与方式:
1️⃣ 在 Gate 广场发布原创内容,主题需与 FLK 或相关活动(HODLer Airdrop / Launchpool)相关;
2️⃣ 内容不少于 80 字;
3️⃣ 帖子添加话题:#发帖赢代币FLK
4️⃣ 附上任意活动参与截图。
🏆 奖励设置(总奖池:200 FLK)
🥇 一等奖(1名):50 FLK
🥈 二等奖(3名):25 FLK / 人
🥉 三等奖(6名):12.5 FLK / 人
📄 注意事项:
内容必须原创,禁止抄袭或刷量;
获奖者需完
‘Pixnapping’ Android attack could expose crypto wallet seed phrases
A newly discovered Android vulnerability enables malicious applications to access content displayed by other apps, potentially compromising crypto wallet recovery phrases, two-factor authentication (2FA) codes and more.
According to a recent research paper, the “Pixnapping” attack “bypasses all browser mitigations and can even steal secrets from non-browser apps.” This is possible by leveraging Android application programming interfaces (API) to calculate the content of a specific pixel displayed by a different application.
This is not as simple as the malicious application requesting and accessing the display content of another application. Instead, it layers a stack of attacker-controlled, semi-transparent activities to mask all but a chosen pixel, then manipulates that pixel so its color dominates the frame.
By repeating this process and timing frame renders, the malware infers those pixels to reconstruct on-screen secrets. This, fortunately, takes time and limits the attack’s usefulness against content that is not displayed for more than a few seconds.
One kind of particularly sensitive information that tends to stay on screen for much longer than a few seconds is crypto wallet recovery phrases. Those phrases, which allow full, unchecked access to the connected crypto wallets, require users to write them down for safekeeping. The paper tested the attack on 2FA codes on Google Pixel devices:
While a full 12-word recovery phrase would take much longer to capture, the attack remains viable if the user leaves the phrase visible while writing it down.
Related: UK renews Apple iCloud backdoor push, threatening crypto wallet security
Google’s response
The vulnerability was tested on five devices running Android versions 13 to 16: the Google Pixel 6, Google Pixel 7, Google Pixel 8, Google Pixel 9 and the Samsung Galaxy S25. The researchers said the same attack could work on other Android devices since the exploited APIs are widely available.
Google initially attempted to patch the flaw by limiting how many activities an app can blur at once. However, the researchers said they found a workaround that still enables Pixnapping to function.
According to the paper, Google rated the issue as high severity and committed to awarding the researchers a bug bounty. The team also reached out to Samsung to warn that “Google’s patch was insufficient to protect Samsung devices.”
Related: Best crypto hardware wallets for 2025
Hardware wallets offer safe protection
The most obvious solution to the issue is to avoid displaying recovery phrases or any other particularly sensitive content on Android devices. Even better would be to avoid displaying recovery information on any internet-capable device.
A simple solution to achieve just that is to use a hardware wallet. A hardware wallet is a dedicated key management device that signs transactions externally to a computer or smartphone without ever exposing the private key or recovery phrase. As threat researcher Vladimir S put it in an X post on the subject:
Magazine: ‘Help! My robot vac is stealing my Bitcoin’: When smart devices attack