<?xml version="1.0" encoding="utf-8" ?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:tt="http://teletype.in/" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"><title>RetroFlowX</title><author><name>RetroFlowX</name></author><id>https://teletype.in/atom/retroflowx</id><link rel="self" type="application/atom+xml" href="https://teletype.in/atom/retroflowx?offset=0"></link><link rel="alternate" type="text/html" href="https://teletype.in/@retroflowx?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=retroflowx"></link><link rel="next" type="application/rss+xml" href="https://teletype.in/atom/retroflowx?offset=10"></link><link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></link><updated>2026-04-05T11:00:13.545Z</updated><entry><id>retroflowx:plume_guide</id><link rel="alternate" type="text/html" href="https://teletype.in/@retroflowx/plume_guide?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=retroflowx"></link><title>Plume Season 2 — подробный гайд по квестам и фарму дропа</title><published>2025-06-08T15:39:54.187Z</published><updated>2025-07-10T14:52:30.591Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img2.teletype.in/files/52/55/52558390-cc25-4138-90fc-360529cdb0de.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img2.teletype.in/files/17/b1/17b12bae-b507-4dae-92e7-df44cba3fa0d.png&quot;&gt;Plume — это модульный L2 на OP Stack, фокусированный на токенизации Real World Assets (RWA), включая недвижимость, ценные бумаги, золото и др. Сеть строится поверх Celestia и Arbitrum Nitro, обеспечивая низкие комиссии и высокой пропускной способностью. Который в своё время привлёк более $10 млн.

Сейчас идёт 2 сезон, где можно собирать бейджи, выполнять квесты и получать XP.</summary><content type="html">
  &lt;p id=&quot;Oka4&quot;&gt;&lt;a href=&quot;https://t.me/retroflowx&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;RetroFlowX&lt;/strong&gt;&lt;/a&gt; - RetroDrop, NFT, IDO, раздачи и прочие активности!&lt;/p&gt;
  &lt;figure id=&quot;rL4Z&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/17/b1/17b12bae-b507-4dae-92e7-df44cba3fa0d.png&quot; width=&quot;1280&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;WFJO&quot;&gt;&lt;a href=&quot;https://portal.plume.org/?referrer=XanthicToweringPond881&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Plume&lt;/strong&gt;&lt;/a&gt; — это &lt;strong&gt;модульный L2 на OP Stack&lt;/strong&gt;, фокусированный на &lt;strong&gt;токенизации Real World Assets (RWA)&lt;/strong&gt;, включая недвижимость, ценные бумаги, золото и др. Сеть строится поверх Celestia и Arbitrum Nitro, обеспечивая низкие комиссии и высокую пропускную способность. Который в своё время привлёк более &lt;strong&gt;$10 млн&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;Сейчас идёт &lt;strong&gt;2 сезон&lt;/strong&gt;, где можно собирать бейджи, выполнять квесты и получать XP.&lt;/p&gt;
  &lt;h2 id=&quot;FEDl&quot;&gt;Кто стоит за Plume?&lt;/h2&gt;
  &lt;ul id=&quot;IUTe&quot;&gt;
    &lt;li id=&quot;zXPx&quot;&gt;&lt;strong&gt;Seed $10 млн&lt;/strong&gt; (май 2024) от Haun Ventures (лид), Galaxy Ventures, Superscrypt, A Capital, SV Angel, Portal Ventures, Reciprocal Ventures + ангелы (Wormhole, EigenLayer и др.).&lt;/li&gt;
    &lt;li id=&quot;wsj0&quot;&gt;&lt;strong&gt;Series A $20 млн&lt;/strong&gt; (общий капитал $30 млн) – присоединились Brevan Howard Digital, Lightspeed Faction и др.&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;V8l8&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;tAeU&quot;&gt;О чём 2-й сезон?&lt;/h2&gt;
  &lt;p id=&quot;N9q5&quot;&gt;Во втором сезоне Plume сосредоточен на &lt;strong&gt;глубоком вовлечении в экосистему через квесты, активность и стекинг&lt;/strong&gt;. Вас ждут:&lt;/p&gt;
  &lt;ul id=&quot;x0XE&quot;&gt;
    &lt;li id=&quot;srEt&quot;&gt;&lt;strong&gt;Система Plume Points (PP)&lt;/strong&gt; — очки начисляются за действия в экосистеме: свапы, бриджи, стекинг и ежедневные задания.&lt;/li&gt;
    &lt;li id=&quot;U2Bt&quot;&gt;&lt;strong&gt;Раздел Level Up&lt;/strong&gt; — пошаговое выполнение квестов, каждый из которых приносит PP и помогает разобраться в возможностях платформы.&lt;/li&gt;
    &lt;li id=&quot;qT0r&quot;&gt;&lt;strong&gt;Ежедневный Spin&lt;/strong&gt; — прокрутка даёт шанс получить бонусные PP.&lt;/li&gt;
    &lt;li id=&quot;04wq&quot;&gt;&lt;strong&gt;10x Multiplier за стекинг токенов PLUME&lt;/strong&gt; — временная акция, позволяющая ускорить фарм очков.&lt;/li&gt;
    &lt;li id=&quot;UeEq&quot;&gt;&lt;strong&gt;Таблица лидеров (Leaderboard)&lt;/strong&gt; — отображает активнейших пользователей, что может намекать на будущие награды.&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;ymLT&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;txtp&quot; data-align=&quot;center&quot;&gt;Подключение и авторизация&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;a1Ov&quot;&gt;• Перейдите на &lt;a href=&quot;https://portal.plume.org/?referrer=XanthicToweringPond881&quot; target=&quot;_blank&quot;&gt;portal.plume.org&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;cKN9&quot;&gt;• Нажмите &lt;strong&gt;Connect Wallet&lt;/strong&gt; (например MetaMask)&lt;/p&gt;
  &lt;figure id=&quot;eIAp&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/bf/47/bf476eb5-0593-4f0f-bfd9-cbf730375ce7.png&quot; width=&quot;1900&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;IW9n&quot;&gt;• После входа увидите панель с Plume Points, Spin Streak и доступом к квестам&lt;/p&gt;
  &lt;p id=&quot;A4Ga&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;rfED&quot; data-align=&quot;center&quot;&gt;Выполняем квесты во вкладке &lt;a href=&quot;https://portal.plume.org/?referrer=XanthicToweringPond881&quot; target=&quot;_blank&quot;&gt;Level Up&lt;/a&gt;&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;y1aM&quot;&gt;Переходим во вкладку Level Up и проступаем к выполнению квеста №1&lt;/p&gt;
  &lt;figure id=&quot;Lhg3&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/7a/9f/7a9f643e-417c-44b4-8e17-c5fb7e6696a0.png&quot; width=&quot;1897&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;lBTD&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://portal.plume.org/level-up/get_essentials&quot; target=&quot;_blank&quot;&gt;Quest 1 &lt;/a&gt;—&lt;/strong&gt;Настройка для работы с RWAfi-экосистемой Plume&lt;/h2&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;t4QR&quot;&gt;Шаг 1. Используем мост в Plume &lt;/h3&gt;
  &lt;p id=&quot;Yez5&quot;&gt;Для начала работы вам понадобятся токены &lt;strong&gt;$PLUME в сети Plume Mainnet&lt;/strong&gt;.&lt;/p&gt;
  &lt;p id=&quot;JOLB&quot;&gt;• Переходим во вкладку &lt;strong&gt;Bridge&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FnOS&quot;&gt;• Отправляем токены $PLUME из Ethereum в сеть Plume( рекомендую иметь  не менее 100 токенов Plume)&lt;/p&gt;
  &lt;figure id=&quot;c83p&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/2d/86/2d86ff11-196d-4b93-b404-1cb41e5b3478.png&quot; width=&quot;1896&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;H8xZ&quot;&gt;• Подтверждаем транзакцию и дожидаемся её подтверждения.&lt;/p&gt;
  &lt;p id=&quot;L1GW&quot;&gt;Это обязательный шаг — многие квесты и начисление PP завязаны именно на активности в сети Plume.&lt;/p&gt;
  &lt;figure id=&quot;5fLp&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/20/f3/20f32f35-5993-4bf4-9d31-d860299c90fd.png&quot; width=&quot;1182&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;s17n&quot;&gt;Шаг 2. Делаем Swap&lt;/h3&gt;
  &lt;p id=&quot;yh4E&quot;&gt;После того как токены окажутся в сети Plume, выполняем свапы:&lt;/p&gt;
  &lt;p id=&quot;5ynR&quot;&gt;• Переходим во вкладку &lt;strong&gt;Swap&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;52du&quot;&gt;• Выбираем $PLUME в первой строке&lt;/p&gt;
  &lt;p id=&quot;yLHS&quot;&gt;• Во второй — $USDC&lt;/p&gt;
  &lt;p id=&quot;myUE&quot;&gt;• Указываем сумму любую и подтверждаем&lt;/p&gt;
  &lt;figure id=&quot;GcFy&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/42/c9/42c9bbc7-4228-4adc-b7ee-3ade274d7bab.png&quot; width=&quot;1880&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;7ap9&quot;&gt;&lt;/p&gt;
  &lt;h3 id=&quot;ybFl&quot;&gt;Шаг 3. Минтим Plume USD&lt;/h3&gt;
  &lt;p id=&quot;pWBQ&quot;&gt;Минтим нативный стейблкоин сети Plume — &lt;strong&gt;pUSD&lt;/strong&gt;. Он привязан 1:1 к фиатным стейблам($USDC) и поддерживается во всех RWAfi-приложениях сети.&lt;/p&gt;
  &lt;p id=&quot;8iaZ&quot;&gt;• Переходим по &lt;a href=&quot;https://pusd.plume.org/&quot; target=&quot;_blank&quot;&gt;ссылке &lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;Y8q4&quot;&gt;• Выбираем  любое количество токенов для депозита в $USDC&lt;/p&gt;
  &lt;p id=&quot;CsN2&quot;&gt;• Жмём &lt;strong&gt;Mint &lt;/strong&gt;и подтверждаем в кошельке&lt;/p&gt;
  &lt;figure id=&quot;Orff&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/a6/87/a6877038-36f7-4aac-b837-a84eae9c1acf.png&quot; width=&quot;874&quot; /&gt;
  &lt;/figure&gt;
  &lt;hr /&gt;
  &lt;p id=&quot;rPFc&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;Q18j&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/13/e1/13e1b97c-094d-4761-bb83-b2684db534f3.png&quot; width=&quot;1194&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;603h&quot;&gt; &lt;/p&gt;
  &lt;h3 id=&quot;TozW&quot;&gt;Шаг 4. Обмен на Rooster — флагманском RWA DEX&lt;/h3&gt;
  &lt;p id=&quot;HQEZ&quot;&gt;&lt;strong&gt;Rooster&lt;/strong&gt; — собственная DEX площадка Plume для работы с RWA-активами. Тут можно протестировать ликвидность и провести обмен токенов.&lt;/p&gt;
  &lt;p id=&quot;SQJq&quot;&gt;• Заходим на &lt;a href=&quot;https://www.rooster-protocol.xyz/swap?tokenA=PLUME&quot; target=&quot;_blank&quot;&gt;Rooster&lt;/a&gt; и коннектим EVM&lt;/p&gt;
  &lt;figure id=&quot;LIlz&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/b9/37/b937cdbd-0ac5-4ae3-9998-7e80d11dae60.png&quot; width=&quot;1427&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;m9Up&quot;&gt;• Выбираем пару для обмена, например: Plume USD ↔ nALPHA&lt;/p&gt;
  &lt;p id=&quot;7mOe&quot;&gt;• Подтверждаем обмен и подписываем транзакцию в кошельке&lt;/p&gt;
  &lt;figure id=&quot;Lv2J&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/ef/c0/efc06e4c-b81a-48ee-9a4c-8070879506cd.png&quot; width=&quot;541&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;fYx0&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/d8/20/d8209072-a282-4a88-ad2e-d943e07f2e06.png&quot; width=&quot;1247&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;OO8j&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;j29x&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/27/ae/27ae02f8-f19e-46ad-ae05-55b4ee76cd95.png&quot; width=&quot;1231&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;o57l&quot;&gt;&lt;/p&gt;
  &lt;hr /&gt;
  &lt;h3 id=&quot;fSdA&quot;&gt;Шаг 5. Обмен на Ambient&lt;/h3&gt;
  &lt;p id=&quot;hSvN&quot;&gt;В финале используем интеграцию с DEX &lt;strong&gt;Ambient&lt;/strong&gt;, чтобы показать активность и заодно разнообразить ликвидность:&lt;/p&gt;
  &lt;p id=&quot;qz2M&quot;&gt;• Подключаем &lt;a href=&quot;https://plume.ambient.finance/swap/chain=0x18232&amp;tokenA=0xdddD73F5Df1F0DC31373357beAC77545dC5A6f3F&amp;tokenB=0x0000000000000000000000000000000000000000&quot; target=&quot;_blank&quot;&gt;кошелёк.&lt;/a&gt;&lt;/p&gt;
  &lt;figure id=&quot;bWXq&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/5d/21/5d214abf-3234-41ad-81e8-01e6b9e3848d.png&quot; width=&quot;1903&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;78oX&quot;&gt;• Подтверждаем свап, например: USDC ↔ $PLUME или другой актив&lt;/p&gt;
  &lt;p id=&quot;KUCG&quot;&gt;• Поти подтверждаем в кошельке.&lt;/p&gt;
  &lt;figure id=&quot;lOZC&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/b8/9a/b89a69ae-3859-4bbd-add9-900b17c4ceeb.png&quot; width=&quot;743&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;275c&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;58JV&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/1b/97/1b979554-bb6b-4e5b-8ac3-c06a9740f603.png&quot; width=&quot;1200&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;qZyd&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/get_essentials&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;Jhfo&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/34/8d/348d0480-ba69-4f49-b322-c1223aff9d16.png&quot; width=&quot;1256&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;WiNc&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/4c/d5/4cd5c85a-8d8b-441f-9210-16bb8480c5f4.png&quot; width=&quot;1333&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;5hcp&quot; data-align=&quot;center&quot;&gt;&lt;a href=&quot;https://portal.plume.org/level-up/nest_staking_swapping&quot; target=&quot;_blank&quot;&gt;Quest 2&lt;/a&gt; — Зарабатываем доход с реальных активов через Nest&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;wFAJ&quot;&gt;Plume позволяет получать доход так же просто, как в обычных DeFi-протоколах — только теперь с обеспечением из реального мира.&lt;/p&gt;
  &lt;h3 id=&quot;cZdC&quot;&gt;Шаг 1. Stake в Nest Alpha Vault&lt;/h3&gt;
  &lt;p id=&quot;lsvX&quot;&gt;Стейкаем токены в &lt;strong&gt;Nest Alpha Vault&lt;/strong&gt; под &lt;strong&gt;10.5% APY&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;RmJ2&quot;&gt;• Переходим по &lt;a href=&quot;https://app.nest.credit/nest-alpha-vault&quot; target=&quot;_blank&quot;&gt;ссылке&lt;/a&gt; и подключаем кошелек&lt;/p&gt;
  &lt;figure id=&quot;BIq9&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/2b/6d/2b6d24b1-387f-4ad3-860d-fc1e05d4d747.png&quot; width=&quot;1852&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;Hj5o&quot;&gt;• Выбираем сумму и подтверждаем стейкинг. &lt;/p&gt;
  &lt;figure id=&quot;YMgO&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/8c/9b/8c9bc43b-b547-4cb8-a663-adc1a5e12cd0.png&quot; width=&quot;1542&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;0dRl&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;zUsM&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/b1/e3/b1e3c68f-17f7-4107-89d2-d6fb6792c582.png&quot; width=&quot;1188&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;DY5c&quot;&gt;Шаг 2. Обмен nALPHA на Rooster&lt;/h3&gt;
  &lt;p id=&quot;7hYj&quot;&gt;Переходим на &lt;a href=&quot;https://www.rooster-protocol.xyz/swap?chain=98866&amp;tokenA=0x593cCcA4c4bf58b7526a4C164cEEf4003C6388db&amp;tokenB=0xdddD73F5Df1F0DC31373357beAC77545dC5A6f3F&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Rooster&lt;/strong&gt; &lt;/a&gt;(RWA DEX от Plume) и свапаем &lt;strong&gt;nALPHA&lt;/strong&gt; на другие токены.&lt;br /&gt;Это часть экосистемной активности.&lt;/p&gt;
  &lt;figure id=&quot;X0el&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/22/7c/227c3927-1c46-440b-b1fa-c6f6a738a426.png&quot; width=&quot;1465&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;jb5g&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;DzrR&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/88/bb/88bbf68f-ba19-429a-9b84-9003fcf074a2.png&quot; width=&quot;1181&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;VioE&quot;&gt;Шаг 3. Stake в Nest Credit Vault&lt;/h3&gt;
  &lt;p id=&quot;igi8&quot;&gt;• Теперь размещаем средства в&lt;a href=&quot;https://app.nest.credit/nest-credit-vault&quot; target=&quot;_blank&quot;&gt; &lt;strong&gt;Nest Credit Vault&lt;/strong&gt; &lt;/a&gt;с доходностью &lt;strong&gt;7% APY&lt;/strong&gt;.&lt;br /&gt;• Повторяем действия, как в шаге 1.&lt;/p&gt;
  &lt;figure id=&quot;zo7g&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/67/2e/672eae0c-a7c5-456d-9eb3-3d0b9c31f700.png&quot; width=&quot;1478&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;qZ6L&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;Az3c&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/f6/0f/f60f2b22-d478-4c71-bad1-f7f4451a39b6.png&quot; width=&quot;1196&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;sOYj&quot;&gt;Шаг 4. Stake в Nest Treasury Vault&lt;/h3&gt;
  &lt;p id=&quot;GgbE&quot;&gt;• Завершаем квест в &lt;strong&gt;&lt;a href=&quot;https://app.nest.credit/nest-treasury-vault&quot; target=&quot;_blank&quot;&gt;Nest Treasury Vault&lt;/a&gt;&lt;/strong&gt;, где доходность составляет &lt;strong&gt;5% APY&lt;/strong&gt; и основана на гособлигациях США.&lt;/p&gt;
  &lt;figure id=&quot;et6r&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/b4/f8/b4f88641-2186-4d0f-8fae-6c6e576a494d.png&quot; width=&quot;1409&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;AYsk&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;WYIl&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/7b/3e/7b3eca79-f987-47d1-aa3e-2e244113591b.png&quot; width=&quot;1193&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;uSIj&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/nest_staking_swapping&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;oNJw&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/ff/b2/ffb2e357-9551-4c10-b219-ec34d298f0d1.png&quot; width=&quot;1203&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;SZel&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/b4/ac/b4ac8ddb-2aa0-4068-a7a0-9d975359a1c3.png&quot; width=&quot;1187&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;b3P7&quot; data-align=&quot;center&quot;&gt;&lt;a href=&quot;https://portal.plume.org/level-up/dex_lp&quot; target=&quot;_blank&quot;&gt;Quest 3 &lt;/a&gt;— Добавляем ликвидность на DEX&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;VNyO&quot;&gt;Участвуем в развитии Plume-экосистемы и бустим доход от RWA, предоставляя ликвидност:&lt;/p&gt;
  &lt;p id=&quot;tuOB&quot;&gt;&lt;/p&gt;
  &lt;h3 id=&quot;bwV1&quot;&gt;&lt;strong&gt;Шаг 1. Вносим ликвидность на Rooster&lt;/strong&gt;&lt;/h3&gt;
  &lt;p id=&quot;x0jy&quot;&gt;• Переходим по &lt;a href=&quot;https://www.rooster-protocol.xyz/add-liquidity?chain=98866&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;ссылке&lt;/strong&gt;&lt;/a&gt; и  подключаем кошелек&lt;/p&gt;
  &lt;p id=&quot;xYEv&quot;&gt;• Выбираем любой пул и нажимаем &lt;strong&gt;Deposit&lt;/strong&gt;, возьмем в пример &lt;strong&gt;pUSD-PLUME&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;gQCO&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/8f/85/8f854827-9c91-4e19-8f94-9f0575b0dcd4.png&quot; width=&quot;1596&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;dApT&quot;&gt;• Далее &lt;strong&gt;New Deposit&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;24AY&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/55/ee/55ee7951-540d-415a-a424-fe4f5fc003db.png&quot; width=&quot;1722&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;PvyC&quot;&gt;• Дальше спускаемся ниже по странице и вносим любое количество токенов, нажимаем&lt;strong&gt; Deposit&lt;/strong&gt;. Подписываем транзакцию.&lt;/p&gt;
  &lt;figure id=&quot;mDVg&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/e7/c7/e7c79990-c005-45cf-a6e2-018e0ff51756.png&quot; width=&quot;1295&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;597a&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/dex_lp&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;1CcM&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/6d/6f/6d6fb689-da7b-4055-ba3c-9e6dfed20611.png&quot; width=&quot;1223&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;dyEi&quot; data-align=&quot;center&quot;&gt;&lt;a href=&quot;https://portal.plume.org/level-up/supply_borrow_lending_markets&quot; target=&quot;_blank&quot;&gt;Quest 4 &lt;/a&gt;— Лендинг и буст дохода&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;8jmr&quot;&gt;Работаем с протоколом &lt;strong&gt;Solera&lt;/strong&gt; и используем RWA токены для кредитования и заимствования:&lt;/p&gt;
  &lt;h3 id=&quot;SSn7&quot;&gt;Шаг 1. Выдаём займ на Solera&lt;/h3&gt;
  &lt;p id=&quot;ziJE&quot;&gt;• Заходим в &lt;a href=&quot;https://app.solera.market/markets/&quot; target=&quot;_blank&quot;&gt;Solera&lt;/a&gt; и подключаем кошелек&lt;/p&gt;
  &lt;p id=&quot;ME6U&quot;&gt;• Выбираем актив (например, &lt;strong&gt;pUSD&lt;/strong&gt;)&lt;/p&gt;
  &lt;figure id=&quot;xHR3&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/46/1b/461bed8f-af22-4a61-9db9-a3c47e23cb77.png&quot; width=&quot;1878&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;WQVX&quot;&gt;• Нажимаем&lt;strong&gt; Supply&lt;/strong&gt;, вносим любое количество токенов и нажимаем &lt;strong&gt;Supply pUSD&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;GECu&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/96/34/9634f4aa-622d-49e7-b40e-6b8aa5a0df1d.png&quot; width=&quot;1671&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;vwUA&quot;&gt;• Подтверждаем &lt;strong&gt;стейкинг&lt;/strong&gt; как залог&lt;/p&gt;
  &lt;figure id=&quot;3jks&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/fc/f6/fcf6c8d3-52d8-42c7-9284-dd77da4cd5d6.png&quot; width=&quot;621&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;XsT6&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;JrDD&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/d2/cd/d2cd44ce-e551-45a5-954d-fa14750f5b97.png&quot; width=&quot;1185&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;FwfS&quot;&gt;Шаг 2. Берём займ на Solera&lt;/h3&gt;
  &lt;p id=&quot;3S8G&quot;&gt;• После внесения залога — переходим в раздел &lt;strong&gt;Borrow&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;AB8Z&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/a8/31/a831326a-eca4-4ecd-a6f4-ab68e88c9180.png&quot; width=&quot;1627&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;hbXh&quot;&gt;• Выбираем сумму и подтверждаем&lt;/p&gt;
  &lt;figure id=&quot;BhCR&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/f2/ed/f2ed6d0a-2ace-4235-ae34-05bc9ed1f6d9.png&quot; width=&quot;647&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;SDdQ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/12/0c/120c9369-5389-40e1-97cb-fd8e9dc09a17.png&quot; width=&quot;654&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;T1Pg&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;08bS&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/88/a1/88a10ccd-60cf-40db-8aff-622b3ca22004.png&quot; width=&quot;1178&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;jtjn&quot;&gt;Шаг 3. Усиливаем доход через loop&lt;/h3&gt;
  &lt;p id=&quot;nLKJ&quot;&gt;• Переходим в раздел &lt;strong&gt;Looping&lt;/strong&gt; и выбираем любой актив (например, &lt;strong&gt;nALPHA&lt;/strong&gt;)&lt;/p&gt;
  &lt;figure id=&quot;YPHy&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/9f/89/9f896e80-a15c-4b46-a09e-4a03cf810b71.png&quot; width=&quot;1881&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ltzX&quot;&gt;• Вносим любое количество токенов, выбираем &lt;strong&gt;Loops&lt;/strong&gt; и нажимаем&lt;strong&gt; Loop nALPHA&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;PMkb&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/15/fe/15fece86-76af-4621-b103-93f87506f5ea.png&quot; width=&quot;1613&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;AkWM&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/34/40/34402a27-7826-4a93-b693-dc8f21238893.png&quot; width=&quot;555&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;2sRF&quot;&gt;• Подтверждаем транзакцию &lt;/p&gt;
  &lt;figure id=&quot;eLR2&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/30/7b/307b4ae3-ee6a-46f6-831b-691b14452568.png&quot; width=&quot;574&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;vqa8&quot;&gt;• Проверяем выполнения задания.&lt;/p&gt;
  &lt;figure id=&quot;iDhA&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/65/0a/650aba79-ee70-47b0-ad8d-23425a722664.png&quot; width=&quot;1189&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;yP3p&quot;&gt;Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/supply_borrow_lending_markets&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;Qfm2&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/d5/aa/d5aa6315-dc96-42a3-b384-66585eebb91c.png&quot; width=&quot;1212&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;mw5U&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/ac/3c/ac3c4977-e60c-480e-ba0e-ba1521b25f1e.png&quot; width=&quot;1193&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;M1c3&quot; data-align=&quot;center&quot;&gt;&lt;a href=&quot;https://portal.plume.org/level-up/stake_plume&quot; target=&quot;_blank&quot;&gt;Quest 5&lt;/a&gt; —  Стейкаем $PLUME&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;Wepe&quot;&gt;&lt;br /&gt;&lt;strong&gt;Шаг 1&lt;/strong&gt;. Переходим по&lt;strong&gt; &lt;a href=&quot;https://staking.plume.org/&quot; target=&quot;_blank&quot;&gt;ссылке&lt;/a&gt;&lt;/strong&gt; и коннектим кошелек&lt;/p&gt;
  &lt;p id=&quot;vAXk&quot;&gt;&lt;strong&gt;Шаг 2.&lt;/strong&gt; В разделе &lt;strong&gt;стейкинга&lt;/strong&gt; укажите количество &lt;strong&gt;$PLUME&lt;/strong&gt;, которое хотите застейкать&lt;/p&gt;
  &lt;p id=&quot;9LOf&quot;&gt;&lt;strong&gt;Шаг 3. &lt;/strong&gt;После выбираем &lt;strong&gt;валидатора&lt;/strong&gt; (в нашем случае, мы выбрали Bioeconomy).&lt;/p&gt;
  &lt;p id=&quot;Asgk&quot;&gt;&lt;strong&gt;Шаг 4.&lt;/strong&gt; Нажимаем&lt;strong&gt; Stake&lt;/strong&gt; и подписываем транзакцию.&lt;/p&gt;
  &lt;figure id=&quot;CDXh&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/c5/07/c507f9dc-bf33-47f3-894a-0155a985f543.png&quot; width=&quot;1757&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;BYiE&quot;&gt;&lt;strong&gt;Шаг 5.&lt;/strong&gt; Проверяем статус стекинга&lt;br /&gt;• После выполнения транзакции интерфейс покажет ваш активный стейк&lt;/p&gt;
  &lt;figure id=&quot;zUP4&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/c0/e0/c0e0b000-5709-45ab-bdfc-9c9cad5bd2ea.png&quot; width=&quot;742&quot; /&gt;
    &lt;figcaption&gt;.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;oV96&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/stake_plume&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;GSKI&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/85/67/8567bca7-3dd7-4b99-bac3-6e9f9091c541.png&quot; width=&quot;1234&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;9lb8&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;BxzQ&quot; data-align=&quot;center&quot;&gt;&lt;a href=&quot;https://portal.plume.org/level-up/onchain_games&quot; target=&quot;_blank&quot;&gt;Quest 6 &lt;/a&gt;— Крутим Daily Spin&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;yEFa&quot;&gt;&lt;strong&gt;Шаг 1.&lt;/strong&gt; Переходим в раздел &lt;strong&gt;Daily Spin &lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;oUza&quot;&gt;&lt;strong&gt;Шаг 2.&lt;/strong&gt; Кликните на кнопку “&lt;strong&gt;Spin&lt;/strong&gt;”&lt;/p&gt;
  &lt;p id=&quot;Yldi&quot;&gt;&lt;strong&gt;Шаг 3. &lt;/strong&gt;Подписываем транзакцию и &lt;strong&gt;получаем приз&lt;/strong&gt;.&lt;/p&gt;
  &lt;figure id=&quot;XayN&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/b2/b9/b2b9751d-ce4d-4d53-9b26-b14961d2bb03.png&quot; width=&quot;1839&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;6emf&quot;&gt;&lt;strong&gt;Шаг 4. &lt;/strong&gt;Вращаем &lt;strong&gt;ежедневно колесо &lt;/strong&gt;и забираем &lt;/p&gt;
  &lt;figure id=&quot;HCWB&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/67/3c/673c990c-2039-4876-9cf3-9d495f599208.png&quot; width=&quot;1432&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;LhTR&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/onchain_games&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;VTmZ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/24/4c/244c6759-170f-49dc-82e5-530f784108dd.png&quot; width=&quot;1231&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;De19&quot; data-align=&quot;center&quot;&gt;&lt;a href=&quot;https://portal.plume.org/level-up/access_unique_assets&quot; target=&quot;_blank&quot;&gt;Quest 7&lt;/a&gt;: Инвестируем в золото через Rooster (Matrixdock xAUM)&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;B5Ht&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;vtJ5&quot;&gt;&lt;strong&gt;Шаг 1&lt;/strong&gt;. Покупаем xAUM на Rooster&lt;/p&gt;
  &lt;p id=&quot;D2wb&quot;&gt;• Перейди на&lt;strong&gt; &lt;a href=&quot;https://www.rooster-protocol.xyz/swap?chain=98866&amp;tokenA=0x78adD880A697070c1e765Ac44D65323a0DcCE913&amp;tokenB=0xA0C4F78A29ead4ABf6b7f5B3F0d05C0f3EAb8DDf&quot; target=&quot;_blank&quot;&gt;Rooster DEX&lt;/a&gt;&lt;/strong&gt; и подключи кошелёк&lt;/p&gt;
  &lt;figure id=&quot;Bcjd&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/59/2c/592c98c5-956d-4cdb-8024-01898844f160.png&quot; width=&quot;1894&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;XoZX&quot;&gt;• Обменивай&lt;strong&gt; USDC на xAUM &lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;UjjA&quot;&gt;• &lt;strong&gt;Подтверди транзакцию&lt;/strong&gt; в кошельке и дождись завершения свапа&lt;/p&gt;
  &lt;figure id=&quot;6iZU&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/22/c5/22c53a4d-1170-4e7e-92a8-00d8f3663b9f.png&quot; width=&quot;3650&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;MLoK&quot;&gt;&lt;strong&gt;Шаг 2. &lt;/strong&gt;Предоставляем ликвидность xAUM/USDC&lt;/p&gt;
  &lt;p id=&quot;Bo7n&quot;&gt;• На той же платформе Rooster выбери раздел &lt;strong&gt;&amp;quot;Liquidity&amp;quot;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;zK4v&quot;&gt;• Найди пул &lt;strong&gt;xAUM/USDC&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;q7fT&quot;&gt;• Нажми &lt;strong&gt;&amp;quot;Deposit&amp;quot;&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;gVSF&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/69/85/69855589-afee-41c4-8beb-e95d76df24fe.png&quot; width=&quot;1920&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;BrGC&quot;&gt;• Введи равные суммы в &lt;strong&gt;USDC и xAUM&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;vdDi&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/db/99/db99a9b7-5df5-4b9a-afac-e6849652b608.png&quot; width=&quot;1269&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;F5nc&quot;&gt;• &lt;strong&gt;Подтверди операцию&lt;/strong&gt; → Подпиши в кошельке&lt;/p&gt;
  &lt;p id=&quot;SPCa&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;JubQ&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/access_unique_assets&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;aVVJ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/3b/5c/3b5c36a6-ef7c-433a-bb51-4caa3e6571c9.png&quot; width=&quot;1269&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;vSat&quot; data-align=&quot;center&quot;&gt;Quest 8 — Лимитируй и зарабатывай с Morpho &amp;amp; Merkl&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;AcPS&quot;&gt;&lt;strong&gt;Шаг 1&lt;/strong&gt;: Заработай на Morpho&lt;/p&gt;
  &lt;p id=&quot;B9X0&quot;&gt;• Переходим по ссылке: &lt;a href=&quot;https://lite.morpho.org/plume/earn&quot; target=&quot;_blank&quot;&gt;Morpho на Plume&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;k5ED&quot;&gt;• Подключаем кошелек&lt;/p&gt;
  &lt;p id=&quot;KYVb&quot;&gt;• В разделе &lt;strong&gt;Re7 MetaMorpho&lt;/strong&gt;, выбираем актив &lt;strong&gt;pUSD&lt;/strong&gt;&lt;/p&gt;
  &lt;figure id=&quot;TKP7&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/46/3d/463d04a4-4bdc-443a-989a-9a00dd2ceafc.png&quot; width=&quot;1884&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;1nWc&quot;&gt;• Вносим депозит&lt;/p&gt;
  &lt;figure id=&quot;F2qd&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/a2/a1/a2a1900b-d868-4d08-81d5-fad06ae8612e.png&quot; width=&quot;1842&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;DNO5&quot;&gt;• Подтверждаем транзакцию в кошельке&lt;/p&gt;
  &lt;hr /&gt;
  &lt;p id=&quot;0MJV&quot;&gt;&lt;strong&gt;Шаг 2&lt;/strong&gt;: Займи под залог&lt;/p&gt;
  &lt;p id=&quot;wIYy&quot;&gt;• После внесения &lt;strong&gt;pUSD&lt;/strong&gt;, в том же интерфейсе ищем кнопку &lt;strong&gt;Borrow&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;euLu&quot;&gt;• Выбираем, какой актив хочешь занять (например, &lt;strong&gt;nALPHA&lt;/strong&gt;)&lt;/p&gt;
  &lt;figure id=&quot;V0ho&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/11/15/11159824-cfa7-4a58-98d5-28ea684c4899.png&quot; width=&quot;1886&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ksCx&quot;&gt;• Указываем сумму (в рамках безопасного лимита)&lt;/p&gt;
  &lt;figure id=&quot;Ny6v&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/66/8f/668f6734-266c-477d-85f4-046f0e214f1d.png&quot; width=&quot;977&quot; /&gt;
  &lt;/figure&gt;
  &lt;figure id=&quot;cwYe&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/7e/86/7e868ab8-98a5-4f1b-9c56-48bb02269577.png&quot; width=&quot;1334&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;p0T3&quot;&gt;• Подтверждаем транзакцию&lt;/p&gt;
  &lt;p id=&quot;4a89&quot;&gt;&lt;strong&gt;Шаг 3&lt;/strong&gt;: Забери награды через Merkl&lt;/p&gt;
  &lt;p id=&quot;j11j&quot;&gt;• Переходим на &lt;a href=&quot;https://app.merkl.xyz/?chain=98866&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;Merkl.io&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;0csT&quot;&gt;• Выбираем сеть Plume (если не выбралась автоматически)&lt;/p&gt;
  &lt;p id=&quot;D4VS&quot;&gt;• Подключаем тот же кошелек&lt;/p&gt;
  &lt;p id=&quot;tG2z&quot;&gt;• Ждем несколько часов после депозита — награды отобразятся в списке&lt;/p&gt;
  &lt;p id=&quot;MQTB&quot;&gt;• Когда появится кнопка &lt;strong&gt;Claim&lt;/strong&gt;, нажимаем и подтверждаем в кошельке&lt;/p&gt;
  &lt;p id=&quot;qaji&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;5AW9&quot;&gt;• Теперь возвращаемся на страницу &lt;a href=&quot;https://portal.plume.org/level-up/access_unique_assets&quot; target=&quot;_blank&quot;&gt;квеста&lt;/a&gt; и &lt;strong&gt;проверяем выполнение всех шагов&lt;/strong&gt;. Убедись, что каждый шаг отмечен как выполненный. Баллы Plume будут зачислены на ваш счет в 0:00 UTC.&lt;/p&gt;
  &lt;figure id=&quot;d39x&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img4.teletype.in/files/7d/9d/7d9db13d-1017-42ba-bce0-05606f91c84e.png&quot; width=&quot;1233&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;ZuDg&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;Дополнительные шаги для повышения активности&lt;/strong&gt;&lt;/h2&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;raOh&quot;&gt;Лидерборд&lt;/h3&gt;
  &lt;p id=&quot;3d8G&quot;&gt;• Переходим в раздел &lt;a href=&quot;https://portal.plume.org/leaderboard&quot; target=&quot;_blank&quot;&gt;Leaderboard&lt;/a&gt; и отслеживаем своё место среди других участников.&lt;br /&gt;• &lt;strong&gt;Чем больше вы выполняете квестов, фармите поинты и взаимодействуете с экосистемой — тем выше поднимаетесь!&lt;/strong&gt;&lt;br /&gt;• Бонусы и награды могут быть распределены именно по итогам этого рейтинга.&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;QNif&quot; data-align=&quot;center&quot;&gt;Раздел &lt;a href=&quot;https://portal.plume.org/?referrer=XanthicToweringPond881&quot; target=&quot;_blank&quot;&gt;Explore&lt;/a&gt; — взаимодействуем с экосистемой&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;7hfT&quot;&gt;• В разделе &lt;strong&gt;Explore &lt;/strong&gt;собраны ключевые протоколы и &lt;strong&gt;продукты Plume&lt;/strong&gt;, включая:&lt;/p&gt;
  &lt;figure id=&quot;yvpA&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/e9/e4/e9e42233-704e-4055-a0fe-19b7357438b3.png&quot; width=&quot;1895&quot; /&gt;
  &lt;/figure&gt;
  &lt;ul id=&quot;G3nv&quot;&gt;
    &lt;li id=&quot;3ozd&quot;&gt;&lt;strong&gt;Rooster&lt;/strong&gt; — флагманский RWA DEX&lt;/li&gt;
    &lt;li id=&quot;RsC4&quot;&gt;&lt;strong&gt;Nest&lt;/strong&gt; — хранилища с реальной доходностью&lt;/li&gt;
    &lt;li id=&quot;aGlZ&quot;&gt;&lt;strong&gt;Solera&lt;/strong&gt; — платформа для лендинга и заимствований&lt;/li&gt;
    &lt;li id=&quot;3R22&quot;&gt;И многое другое...&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;7OiS&quot;&gt;&lt;strong&gt;Рекомендуется взаимодействовать со всеми доступными dApps, чтобы не упустить будущие награды! &lt;/strong&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;9lvZ&quot; data-align=&quot;center&quot;&gt;Привязка социальных сетей&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;oDUv&quot;&gt;• Зайдите в профиль и &lt;strong&gt;привяжите Twitter, Discord .&lt;/strong&gt;&lt;br /&gt;• Это может повысить ваш рейтинг и участие в будущих ивентах, а также закрепит ваш аккаунт в системе.&lt;/p&gt;
  &lt;figure id=&quot;jllE&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/8b/5c/8b5cf59e-aa50-4d80-9b1b-11464f40d4a2.png&quot; width=&quot;1849&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;SnIR&quot;&gt;• После прохождения всех квестов и дополнительных действий &lt;strong&gt;возвращаемся на портал и проверяем, всё ли выполнено.&lt;/strong&gt; Чем выше ваша вовлечённость — тем больше шансов получить остаток дропа и попасть в число топ-участников!&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;26wZ&quot; data-align=&quot;center&quot;&gt;Следи за новостями и новыми гайдами&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;FGh0&quot;&gt;&lt;strong&gt;Если гайд оказался полезным — поддержи автора и подпишись на мой Telegram-канал, где я публикую:&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;nNj2&quot;&gt;• &lt;strong&gt;Обзоры &lt;/strong&gt;новых проектов&lt;/p&gt;
  &lt;p id=&quot;tD15&quot;&gt;• &lt;strong&gt;Актуальные&lt;/strong&gt; гайды по ретродропам&lt;/p&gt;
  &lt;p id=&quot;Zk5w&quot;&gt;•&lt;strong&gt; Полезные&lt;/strong&gt; активности и дропы в экосистемах&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;2yxj&quot; data-align=&quot;center&quot;&gt; &lt;br /&gt;Гайд написан каналом&lt;a href=&quot;https://t.me/retroflowx&quot; target=&quot;_blank&quot;&gt; RetroDropX&lt;/a&gt;&lt;/h2&gt;
  &lt;/section&gt;

</content></entry><entry><id>retroflowx:9g7_BPBjajJ</id><link rel="alternate" type="text/html" href="https://teletype.in/@retroflowx/9g7_BPBjajJ?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=retroflowx"></link><title>Ответы на квесты Certik Skynet</title><published>2024-11-21T10:58:43.189Z</published><updated>2025-07-09T09:16:17.079Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/8e/77/8e77d4b9-9fb5-4501-8eb4-acaf38cf31d3.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/81/71/81714627-a03a-4321-b24b-8ed300dda856.jpeg&quot;&gt;Для выполнения:</summary><content type="html">
  &lt;figure id=&quot;E1fc&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/81/71/81714627-a03a-4321-b24b-8ed300dda856.jpeg&quot; width=&quot;1280&quot; /&gt;
    &lt;figcaption&gt;Certik — это кросс-сетевой протокол для безопасности блокчейна. Проект привлек $141 млн из таких фондов, как Binance, Coinbase, Sequoia и другие.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;Ch8W&quot; data-align=&quot;center&quot;&gt;Ответы обновлены 09.07.25&lt;/h3&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;rbGp&quot;&gt;&lt;strong&gt;Для выполнения:&lt;/strong&gt;&lt;/p&gt;
    &lt;ul id=&quot;En4l&quot;&gt;
      &lt;li id=&quot;gtJr&quot;&gt;&lt;strong&gt;Перейдите &lt;/strong&gt;на сайт&lt;a href=&quot;https://skynet.certik.com/quest/signup?referralId=c76fcf6a-04bc-432e-84b8-4ce844d7f5bd&quot; target=&quot;_blank&quot;&gt; CertiK Skynet&lt;/a&gt;.&lt;/li&gt;
      &lt;li id=&quot;WmUU&quot;&gt;&lt;strong&gt;Пройдите &lt;/strong&gt;регистрацию.&lt;/li&gt;
      &lt;li id=&quot;xuMW&quot;&gt;&lt;strong&gt;На вкладке&lt;/strong&gt; «Quest» выполните задания, за которые вы получите Gems и XP.&lt;/li&gt;
      &lt;li id=&quot;4kHi&quot;&gt;&lt;strong&gt;Каждый&lt;/strong&gt; день выполняйте ежедневные задания во вкладке &lt;strong&gt;Daily Tasks&lt;/strong&gt;.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
  &lt;h3 id=&quot;mexP&quot;&gt;&lt;strong&gt;Подпишитесь на наш канал: &lt;a href=&quot;https://t.me/retroflowx&quot; target=&quot;_blank&quot;&gt;Telegram&lt;/a&gt;&lt;/strong&gt;&lt;/h3&gt;
  &lt;p id=&quot;Nhtu&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;wU16&quot; data-align=&quot;center&quot;&gt;Industry Insights&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;zeLu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/blockchain-data-protection-and-privacy-compliance?referralId=1462449779120036693&quot; target=&quot;_blank&quot;&gt;Blockchain Data Protection and Privacy Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wEGp&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It separates sensitive data into off-chain systems while keeping audit logs on-chain&lt;/p&gt;
  &lt;p id=&quot;jdkm&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By verifying data validity without exposing underlying information&lt;/p&gt;
  &lt;p id=&quot;rM95&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/quantum-computing-and-the-future-of-cryptocurrency-security&quot; target=&quot;_blank&quot;&gt;Quantum Computing and the Future of Cryptocurrency Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;QVzq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.They use qubits that can represent multiple states at once&lt;/p&gt;
  &lt;p id=&quot;e5mL&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It ensures only valid users can sign transactions&lt;/p&gt;
  &lt;p id=&quot;JuvC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Current quantum computers lack the number of qubits required to break blockchain encryption&lt;/p&gt;
  &lt;p id=&quot;qDTl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/unlocking-ethereum-etfs-with-blackrocks-etha?referralId=16738242300718908113&quot; target=&quot;_blank&quot;&gt;Unlocking Ethereum ETFs With BlackRock’s ETHA&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JOkW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Ether tokens&lt;/p&gt;
  &lt;p id=&quot;qvVy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.BlackRock&lt;/p&gt;
  &lt;p id=&quot;ZJva&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;mozG&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pump-fun?referralId=13861842479555077209&quot; target=&quot;_blank&quot;&gt;Pump.Fun&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kOIF&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It has a live streaming feature for promoting tokens&lt;/p&gt;
  &lt;p id=&quot;uPo2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;FGPi&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;HpmT&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ai-memecoins-explained-the-new-craze-in-crypto?referralId=6359601855287139227&quot; target=&quot;_blank&quot;&gt;AI Memecoins Explained: The New Craze in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;AgeD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Viral meme-based marketing&lt;/p&gt;
  &lt;p id=&quot;Dqfq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Goatseus Maximus&lt;/p&gt;
  &lt;p id=&quot;Xd2g&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/enhancing-security-awareness-for-web3-desktop-wallets?referralId=7550919449159494369&quot; target=&quot;_blank&quot;&gt;Enhancing Security Awareness for Web3 Desktop Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;E8Z4&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.They are vulnerable to brute-force attacks&lt;/p&gt;
  &lt;p id=&quot;9VJw&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It divides private keys across multiple participants, reducing single points of failure&lt;/p&gt;
  &lt;p id=&quot;PdVK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/okx-and-certik-fast-pass-program?referralId=15462949631044153544&quot; target=&quot;_blank&quot;&gt;OKX and CertiK Fast Pass Program&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FAdL&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Providing rigorous security audits for projects&lt;/p&gt;
  &lt;p id=&quot;F0cu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By receiving regular updates and detailed security reports&lt;/p&gt;
  &lt;p id=&quot;qxhK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/basics-of-hackathons?referralId=15059159019155060961&quot; target=&quot;_blank&quot;&gt;Basics of Hackathons&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OIIJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;cnqu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Small Teams&lt;/p&gt;
  &lt;p id=&quot;eznM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/unveiling-the-kyc-actor-industry?referralId=393510631026831734&quot; target=&quot;_blank&quot;&gt;Unveiling the KYC Actor Industry&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CV7I&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Passing regular verifications is easy&lt;/p&gt;
  &lt;p id=&quot;FB5U&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To steal funds from investors&lt;/p&gt;
  &lt;p id=&quot;50SH&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;Thorough background investigation by professional investigators&lt;/p&gt;
  &lt;p id=&quot;43px&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/build-trust-and-integrity-in-project-teams-with-kyc?referralId=11895142972749046720&quot; target=&quot;_blank&quot;&gt;Build trust and integrity in project teams with KYC&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;H1UU&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It helps users trust the team behind a project&lt;/p&gt;
  &lt;p id=&quot;OFYZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The project team has undergone a thorough identity verification process&lt;/p&gt;
  &lt;p id=&quot;mI5e&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By conducting rigorous identity checks on core team members&lt;/p&gt;
  &lt;p id=&quot;5KVX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kyc-actors-are-ramping-up-their-game?referralId=7649034908515735064&quot; target=&quot;_blank&quot;&gt;KYC Actors are Ramping Up Their Game&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Jfpa&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fraudsters are hiring professional actors to circumvent due diligence&lt;/p&gt;
  &lt;p id=&quot;T9xY&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verify development teams and prevent fraud&lt;/p&gt;
  &lt;p id=&quot;gPaS&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.To open bank accounts and store illicit funds&lt;/p&gt;
  &lt;p id=&quot;XRBz&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/trap-phishing-on-trusted-platforms?referralId=5534648585449167689&quot; target=&quot;_blank&quot;&gt;Trap Phishing on Trusted Platforms&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JogF&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Crypto wallet private keys and mnemonic phrases&lt;/p&gt;
  &lt;p id=&quot;0bhO&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;f1ft&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skyinsights-crypto-compliance?referralId=1950400298119381327&quot; target=&quot;_blank&quot;&gt;SkyInsights: Crypto Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ex3q&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and analyze suspicious activities in cryptocurrency transactions&lt;/p&gt;
  &lt;p id=&quot;HRXp&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.FinCEN&lt;/p&gt;
  &lt;p id=&quot;rnZH&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Entity Labeling &amp;amp; Categorization; Asset Movement Tracing and Logging; Customizable Case Management &amp;amp; Audit Trails.&lt;/p&gt;
  &lt;p id=&quot;m93e&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/vanity-address-and-address-poisoning?referralId=3878179306081855581&quot; target=&quot;_blank&quot;&gt;Vanity Address and Address Poisoning&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eEdf&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Sending funds to a scam address&lt;/p&gt;
  &lt;p id=&quot;uZN9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Always double-check the entire address&lt;/p&gt;
  &lt;p id=&quot;xqh2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;by0B&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/top-performing-cryptocurrencies-of-h1-2024?referralId=11048434819269321528&quot; target=&quot;_blank&quot;&gt;Top Performing Cryptocurrencies of H1 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ln8U&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To form a decentralized AI alliance&lt;/p&gt;
  &lt;p id=&quot;pa75&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.FLOKI&lt;/p&gt;
  &lt;p id=&quot;j6x6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ordinals-and-the-brc-20-standard?referralId=13678169433135283710&quot; target=&quot;_blank&quot;&gt;Ordinals and the BRC-20 Standard&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;o1iM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Token creation and transfer&lt;/p&gt;
  &lt;p id=&quot;RrGv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;yFTb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-exit-scammers-mint-tokens-undetected?referralId=11461917608113812911&quot; target=&quot;_blank&quot;&gt;How Exit Scammers Mint Tokens Undetected&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;fHoD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Bypassing the totalSupply metric&lt;/p&gt;
  &lt;p id=&quot;aIfO&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;QYCU&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/utopiasphere-incident-analysis?referralId=1437817724685870593&quot; target=&quot;_blank&quot;&gt;UtopiaSphere Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2g1a&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$521K&lt;/p&gt;
  &lt;p id=&quot;efcy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.swapBurn()&lt;/p&gt;
  &lt;p id=&quot;TP20&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wazirx-hack-incident-analysis?referralId=4279478896426646772&quot; target=&quot;_blank&quot;&gt;WazirX Hack Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;bQJJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Compromised private key in a multisig wallet&lt;/p&gt;
  &lt;p id=&quot;9yHq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paused all trading and withdrawals&lt;/p&gt;
  &lt;p id=&quot;55h9&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;10% of the total amount&lt;/p&gt;
  &lt;p id=&quot;Suqz&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/a-usd230m-bitcoin-scam-uncovered?referralId=4999350706214614322&quot; target=&quot;_blank&quot;&gt;A $230M Bitcoin Scam Uncovered&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;D2qO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.4,100 BTC&lt;/p&gt;
  &lt;p id=&quot;baju&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Posing as Google and Gemini support&lt;/p&gt;
  &lt;p id=&quot;qwQu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-derec-alliance?referralId=11958568339849254318&quot; target=&quot;_blank&quot;&gt;Understanding the DeRec Alliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qtBD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Standardize secrets management and recovery&lt;/p&gt;
  &lt;p id=&quot;Va9A&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By using encrypted fragments held by multiple helpers&lt;/p&gt;
  &lt;p id=&quot;ku4D&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Support for on-chain and off-chain secrets&lt;/p&gt;
  &lt;p id=&quot;lAol&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-android-spyagent-campaign?referralId=9689426293020000996&quot; target=&quot;_blank&quot;&gt;Understanding the Android SpyAgent Campaign&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VVJK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Mnemonic recovery phrases&lt;/p&gt;
  &lt;p id=&quot;HO7h&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Phishing campaigns&lt;/p&gt;
  &lt;p id=&quot;ZSJm&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/fbi-warns-of-crypto-social-engineering?referralId=1672117372965037986&quot; target=&quot;_blank&quot;&gt;FBI warns of Crypto Social Engineering&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;U5b2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Impersonating well-known individuals&lt;/p&gt;
  &lt;p id=&quot;Edxb&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verify the offer through official channels&lt;/p&gt;
  &lt;p id=&quot;pZlC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Use security software and verify sources&lt;/p&gt;
  &lt;p id=&quot;UKbU&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/web2-meets-web3-hacking-decentralized-applications?referralId=2037822529317149674&quot; target=&quot;_blank&quot;&gt;Web2 Meets Web3: Hacking Decentralized Applications&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IIAV&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Integration of Web2 vulnerabilities and blockchain-specific issues&lt;/p&gt;
  &lt;p id=&quot;0EmG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Full-Scale Dapp&lt;/p&gt;
  &lt;p id=&quot;45Hr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By injecting malicious JavaScript to initiate unauthorized transactions&lt;/p&gt;
  &lt;p id=&quot;v1OW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-ai-role-in-enhancing-web3-security?referralId=12107951350394582841&quot; target=&quot;_blank&quot;&gt;Understanding AI&amp;#x27;s Role in Enhancing Web3 Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;R3MD&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;It enhances transparency and security.&lt;/p&gt;
  &lt;p id=&quot;nVQi&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They offer data security.&lt;/p&gt;
  &lt;p id=&quot;1Qeh&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;qYMo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-binance-clawed-back-73m-in-stolen-funds?referralId=14761267669134044198&quot; target=&quot;_blank&quot;&gt;How Binance Clawed Back $73M in Stolen Funds&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kiXL&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;80%&lt;/p&gt;
  &lt;p id=&quot;frqW&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$55 million&lt;/p&gt;
  &lt;p id=&quot;O4Zr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Increased market growth and volatility&lt;/p&gt;
  &lt;p id=&quot;3R5P&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mastering-bridge-tracing?referralId=4387850454504137944&quot; target=&quot;_blank&quot;&gt;Mastering Bridge Tracing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;BgBN&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To uniquely identify a specific blockchain network&lt;/p&gt;
  &lt;p id=&quot;c79K&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Timing Analysis&lt;/p&gt;
  &lt;p id=&quot;GdS1&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The destination chain and recipient address&lt;/p&gt;
  &lt;p id=&quot;ZJJK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/bot-driven-wash-trading-in-exit-scams?referralId=10065643524715908161&quot; target=&quot;_blank&quot;&gt;Bot-Driven Wash Trading in Exit Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;zrpk&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;9Rfr&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Disperse.app, CoinTool&lt;/p&gt;
  &lt;p id=&quot;wOo6&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;nLq6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/about-satoshi-nakamoto?referralId=13989849903216135521&quot; target=&quot;_blank&quot;&gt;About Satoshi Nakamoto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cRyO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.2008&lt;/p&gt;
  &lt;p id=&quot;M90J&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2011&lt;/p&gt;
  &lt;p id=&quot;iknl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.1 million BTC&lt;/p&gt;
  &lt;p id=&quot;ccqw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/radiant-capitals-usd50m-defi-hack-response?referralId=11996399708582658270&quot; target=&quot;_blank&quot;&gt;Radiant Capital’s $50M DeFi Hack Response&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iRtI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By compromising developer hardware wallets with malware&lt;/p&gt;
  &lt;p id=&quot;dcLZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Reduced signers to seven, with four required for approval&lt;/p&gt;
  &lt;p id=&quot;69Jt&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.72 hours&lt;/p&gt;
  &lt;p id=&quot;iXXp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/truth-terminal-an-ai-and-a-crypto-millionaire?referralId=8781109133763635968&quot; target=&quot;_blank&quot;&gt;Truth Terminal - An AI and a Crypto Millionaire&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JD9i&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Abh9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$50,000 in BTC&lt;/p&gt;
  &lt;p id=&quot;GvRL&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/unmasking-crypto-market-manipulation?referralId=15565306715015506163&quot; target=&quot;_blank&quot;&gt;Unmasking Crypto Market Manipulation&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1cRK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Buying and selling an asset to create fake trading volume&lt;/p&gt;
  &lt;p id=&quot;iHbv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Placing large fake orders to manipulate prices&lt;/p&gt;
  &lt;p id=&quot;5R6R&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Coordinated buying followed by mass selling&lt;/p&gt;
  &lt;p id=&quot;31vr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-us-crypto-tax-forms?referralId=14917579774669395944&quot; target=&quot;_blank&quot;&gt;Understanding U.S. Crypto Tax Forms&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;nv2I&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Form 8949&lt;/p&gt;
  &lt;p id=&quot;eZjC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;mvwW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The duration the asset was held&lt;/p&gt;
  &lt;p id=&quot;qTbl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-report-q2-h1-2024-overview-and-key-highlights?referralId=1771266537997594336&quot; target=&quot;_blank&quot;&gt;Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yMnl&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;x06D&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$1.19 billion&lt;/p&gt;
  &lt;p id=&quot;Io3n&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-report-q2-h1-2024-insights-and-future-security-enhancements?referralId=15990728660013628100&quot; target=&quot;_blank&quot;&gt;Hack3d Report Q2 H1 2024 - Part 2: Insights and Future Security Enhancements&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ixiv&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The need for user education and enhanced verification processes&lt;/p&gt;
  &lt;p id=&quot;LaHZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Meticulously verifying wallet addresses before transactions&lt;/p&gt;
  &lt;p id=&quot;DxCl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-popular-web3-messaging-apps?referralId=6168210370666611473&quot; target=&quot;_blank&quot;&gt;Evaluating Popular Web3 Messaging Apps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;owsB&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Signal&lt;/p&gt;
  &lt;p id=&quot;rDFh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Telegram&lt;/p&gt;
  &lt;p id=&quot;vH27&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/navigating-dao-governance-and-the-compound-dao-incident?referralId=11636985650225362142&quot; target=&quot;_blank&quot;&gt;Navigating DAO Governance and the Compound DAO Incident&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cmWc&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The funds would be stored in a vault controlled by them&lt;/p&gt;
  &lt;p id=&quot;cWiY&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Limited Liability Corporation (LLC)&lt;/p&gt;
  &lt;p id=&quot;GPz7&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Implementing weekend-free voting and experimenting with AI proxy voting&lt;/p&gt;
  &lt;p id=&quot;sFzq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-memecoin-markets-of-springfield?referralId=15058874098420615559&quot; target=&quot;_blank&quot;&gt;The Memecoin Markets of Springfield&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;HVds&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;XMjy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;NxJE&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Chief Wiggum&lt;/p&gt;
  &lt;p id=&quot;G6iQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-top-incident-analyses?referralId=3341046178123889208&quot; target=&quot;_blank&quot;&gt;HACK3D Part 1: Top Incident Analyses&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XmLm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Congestion&lt;/p&gt;
  &lt;p id=&quot;itpR&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The stolen assets were returned to the Munchables team&lt;/p&gt;
  &lt;p id=&quot;Zq0D&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The CEO&amp;#x27;s resignation&lt;/p&gt;
  &lt;p id=&quot;tmbT&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-private-key-compromise?referralId=3790705653166222356&quot; target=&quot;_blank&quot;&gt;HACK3D Part 2: Private Key Compromise&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Yme5&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$239 million&lt;/p&gt;
  &lt;p id=&quot;lx7t&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Chris Larsen&lt;/p&gt;
  &lt;p id=&quot;82py&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;df9l&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-rounding-issue-exploits?referralId=10066772472273759914&quot; target=&quot;_blank&quot;&gt;HACK3D Part 3: Rounding Issue Exploits&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;euQ0&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Newly-deployed lending pools&lt;/p&gt;
  &lt;p id=&quot;2H9u&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Drainage of funds&lt;/p&gt;
  &lt;p id=&quot;nG4n&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;q7Y5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-bgp-hijacking-and-internet-routing-security?referralId=5134984396529824814&quot; target=&quot;_blank&quot;&gt;Understanding BGP Hijacking and Internet Routing Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FUs1&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Diverting traffic by announcing unauthorized IP address blocks&lt;/p&gt;
  &lt;p id=&quot;5RRJ&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Resource Public Key Infrastructure (RPKI), Route Origin Authorization (ROA), Route Origin Validation (ROV);&lt;/p&gt;
  &lt;p id=&quot;3tpa&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;Losses of $1.9 million&lt;/p&gt;
  &lt;p id=&quot;1Hmh&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-impact-of-fit21-on-crypto-compliance?referralId=15340865825240135681&quot; target=&quot;_blank&quot;&gt;Understanding the Impact of FIT21 on Crypto Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;HPJm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;sBbu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To foster innovation and growth&lt;/p&gt;
  &lt;p id=&quot;EaGf&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-ai-is-transforming-kyc-for-crypto-project-teams?referralId=3295661274152174365&quot; target=&quot;_blank&quot;&gt;How AI is Transforming KYC for Crypto Project Teams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3mkt&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Increased precision and speed in verifying identities&lt;/p&gt;
  &lt;p id=&quot;3sgo&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;3y03&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/advanced-formal-verification-of-zk-proofs?referralId=5365226223979668280&quot; target=&quot;_blank&quot;&gt;Advanced Formal Verification of ZK Proofs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ot9p&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A way to verify the correctness of a computation without revealing its details.&lt;/p&gt;
  &lt;p id=&quot;6Kvl&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;fyjQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-part-1-most-common-attack-in-q3-2024?referralId=1134170039223354539&quot; target=&quot;_blank&quot;&gt;Hack3d Part 1: Most Common Attack Vectors in Q3 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;mYib&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;Wdg4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-check URLs and email addresses for legitimacy&lt;/p&gt;
  &lt;p id=&quot;DyFp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-part-2-major-hacks-of-q3-2024?referralId=6920465006978566901&quot; target=&quot;_blank&quot;&gt;Hack3d Part 2: Major Hacks of Q3 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YdZr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$238 million&lt;/p&gt;
  &lt;p id=&quot;Plu2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Private key theft&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;ArBS&quot; data-align=&quot;center&quot;&gt;User Security&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;q0sV&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-your-crypto-in-2025?referralId=13533481038278438264&quot; target=&quot;_blank&quot;&gt;Protecting Your Crypto in 2025&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;drzs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Creating fake dApps to trick users into connecting their wallets&lt;/p&gt;
  &lt;p id=&quot;5GEw&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Etherscan&lt;/p&gt;
  &lt;p id=&quot;CIH4&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They store private keys offline, making them inaccessible to remote hacker&lt;/p&gt;
  &lt;p id=&quot;eaov&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/transaction-simulation-spoofing-how-it-happens-and-how-to-prevent-it?referralId=8905527297012679802&quot; target=&quot;_blank&quot;&gt;Transaction Simulation Spoofing – How It Happens and How to Prevent It&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tppB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Current blockchain state at initialization&lt;/p&gt;
  &lt;p id=&quot;uQgC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verify the legitimacy of the dApp or website&lt;/p&gt;
  &lt;p id=&quot;0Xp6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-scam-contract-behind-transaction-simulation-spoofing?referralId=3715678025345731784&quot; target=&quot;_blank&quot;&gt;The Scam Contract Behind Transaction Simulation Spoofing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;jbEz&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By altering contract state after the simulation&lt;/p&gt;
  &lt;p id=&quot;SiEU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.CertiK’s Token Scan&lt;/p&gt;
  &lt;p id=&quot;VuXr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protect-your-cryptocurrency-from-dust-attacks?referralId=11055552021223246359&quot; target=&quot;_blank&quot;&gt;Protect your cryptocurrency from dust attacks.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;q3mj&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By sending small crypto amounts to analyze wallet activity&lt;/p&gt;
  &lt;p id=&quot;Y8hi&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To trace transactions and link addresses&lt;/p&gt;
  &lt;p id=&quot;3Q9M&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/scam-pattern-on-telegram-safeguard?referralId=7185268624590649965&quot; target=&quot;_blank&quot;&gt;Scam Pattern on Telegram Safeguard&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ppUC&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Scammers impersonate KOLs to lure users into joining groups&lt;/p&gt;
  &lt;p id=&quot;BXiM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Request to provide 2FA one-time codes; Requirement to download software; Prompt to share user credentia; lsInstruction to run a script to verify as human&lt;/p&gt;
  &lt;p id=&quot;JiOk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-web3-workers-from-fake-meeting-app-scams?referralId=11835033241828704894&quot; target=&quot;_blank&quot;&gt;Protecting Web3 Workers from Fake Meeting App Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;c0u8&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By creating professional websites and social media accounts using AI&lt;/p&gt;
  &lt;p id=&quot;F1BK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Frequent name changes for the app&lt;/p&gt;
  &lt;p id=&quot;6VYq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Use a hardware wallet and avoid storing credentials online&lt;/p&gt;
  &lt;p id=&quot;l0wY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-against-crypto-phishing-scams-during-the-holiday-season?referralId=13496656121386600403&quot; target=&quot;_blank&quot;&gt;Protecting Against Crypto Phishing Scams During the Holiday Season&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2QnO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Sending malicious transactions for users to sign&lt;/p&gt;
  &lt;p id=&quot;YUGH&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Online transactions increase, creating more opportunities&lt;/p&gt;
  &lt;p id=&quot;2M3s&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;8R0M&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cybersecurity-best-practices-for-telegram?referralId=1450025577558919814&quot; target=&quot;_blank&quot;&gt;Cybersecurity Best Practices for Telegram&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Svub&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To add an extra layer of security with a password&lt;/p&gt;
  &lt;p id=&quot;Y2J3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Secret Chats&lt;/p&gt;
  &lt;p id=&quot;DZbL&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;hJCv&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/multi-signature-wallets-explained?referralId=3690371426101021028&quot; target=&quot;_blank&quot;&gt;Multi-Signature Wallets Explained &lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FJ6j&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To require multiple approvals for transactions&lt;/p&gt;
  &lt;p id=&quot;y06v&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.3&lt;/p&gt;
  &lt;p id=&quot;Cizu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;wHqt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/case-study-on-the-risks-of-phishing-attacks-in-defi?referralId=1051237503011721733&quot; target=&quot;_blank&quot;&gt;Case Study on the Risks of Phishing Attacks in DeFi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;MJSD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Ownership transfer of DSProxy&lt;/p&gt;
  &lt;p id=&quot;NevG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Inferno Drainer&lt;/p&gt;
  &lt;p id=&quot;ViVG&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By transferring ownership of the DSProxy&lt;/p&gt;
  &lt;p id=&quot;wq51&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-tools-for-tracking-top-crypto-wallets?referralId=545797772777247317&quot; target=&quot;_blank&quot;&gt;Best Tools for Tracking Top Crypto Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gBjI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Dune Analytics&lt;/p&gt;
  &lt;p id=&quot;0SHp&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;d3Sx&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Monitoring crypto market trends&lt;/p&gt;
  &lt;p id=&quot;6lUd&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/website-and-dapp-security?referralId=13278999103800562405&quot; target=&quot;_blank&quot;&gt;Website &amp;amp; dApp Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;i2zM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;UFML&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;The dApp has limited documentation and transparency&lt;/p&gt;
  &lt;p id=&quot;o1eH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/choosing-a-secure-exchange?referralId=15146377076458402765&quot; target=&quot;_blank&quot;&gt;Choosing a Secure Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JDdk&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;All of the above&lt;/p&gt;
  &lt;p id=&quot;cQFW&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;K8ug&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-wallet-security?referralId=16403428101071015288&quot; target=&quot;_blank&quot;&gt;Introduction to Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;128i&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If the custodial service experiences a security breach, hack, or service itself becomes inaccessible, you may lose access to your private keys.&lt;/p&gt;
  &lt;p id=&quot;HCql&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Storing them in a hardware wallet or encrypted offline location&lt;/p&gt;
  &lt;p id=&quot;4mAF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-security-with-skynet-token-scan?referralId=6889895534988717988&quot; target=&quot;_blank&quot;&gt;Evaluating Security with Skynet Token Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VRk6&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Smart contract code&lt;/p&gt;
  &lt;p id=&quot;BrsB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;SLN9&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Severity level&lt;/p&gt;
  &lt;p id=&quot;nyXa&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/team-and-insider-risks?referralId=7800496360587123548&quot; target=&quot;_blank&quot;&gt;Team and Insider Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;fPZL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Lack of accountability and transparency&lt;/p&gt;
  &lt;p id=&quot;5LWc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;kqYZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security?referralId=4683719194833802030&quot; target=&quot;_blank&quot;&gt;Operational Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;MMSY&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;hMyd&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They harness community expertise to identify bugs&lt;/p&gt;
  &lt;p id=&quot;pu2C&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/web3-security-with-skynet?referralId=772035781796166985&quot; target=&quot;_blank&quot;&gt;Web3 Security with Skynet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vqO8&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Security Scores&lt;/p&gt;
  &lt;p id=&quot;hJ0k&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;9cXu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/prioritize-wallet-security-with-skynet-wallet-scanning?referralId=8166383652438326560&quot; target=&quot;_blank&quot;&gt;Prioritize Wallet Security with Skynet Wallet Scanning&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;HOuq&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To identify high-risk approvals and potential threats&lt;/p&gt;
  &lt;p id=&quot;wHsp&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Risky approvals and value at risk&lt;/p&gt;
  &lt;p id=&quot;FhMZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-the-misuse-of-certiks-brand?referralId=8907532782619814531&quot; target=&quot;_blank&quot;&gt;Recognizing the Misuse of CertiK&amp;#x27;s Brand&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;B3QE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Verify their credentials using CertiK’s Employee Verification tool&lt;/p&gt;
  &lt;p id=&quot;TwHe&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;8EHy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security?referralId=7694637572386990685&quot; target=&quot;_blank&quot;&gt;Private Key Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ItEa&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If someone gains access to your private key, they gain access to your crypto assets&lt;/p&gt;
  &lt;p id=&quot;YeuJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Store it offline, preferably in a hardware wallet&lt;/p&gt;
  &lt;p id=&quot;uWsK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security-seed-phrases?referralId=17178613058994527673&quot; target=&quot;_blank&quot;&gt;Private Key Security: Seed Phrases&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZhhB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Create a backup and store it in secure locations&lt;/p&gt;
  &lt;p id=&quot;KXS8&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It can be hacked or accessed by unauthorized parties&lt;/p&gt;
  &lt;p id=&quot;Vf5p&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-risk-signals-on-the-exchange?referralId=15228800082055343187&quot; target=&quot;_blank&quot;&gt;Recognizing Risk Signals on the Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;pzZH&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;They might be recommending a scam or fraudulent scheme&lt;/p&gt;
  &lt;p id=&quot;BrtS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The exchange has liquidity problems or internal issues&lt;/p&gt;
  &lt;p id=&quot;PUwN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/important-exchange-security-features?referralId=16293381021708240115&quot; target=&quot;_blank&quot;&gt;Important Exchange Security Features&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;4f31&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The exchange has strong information security management systems&lt;/p&gt;
  &lt;p id=&quot;i4Ez&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It minimizes the risks associated with using a cryptocurrency exchange&lt;/p&gt;
  &lt;p id=&quot;4pYf&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-reserve?referralId=5543442415609451864&quot; target=&quot;_blank&quot;&gt;Proof of Reserve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;7iNG&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;rWqP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;x3Ae&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/community-and-security-risks-in-web3?referralId=10551768520323127760&quot; target=&quot;_blank&quot;&gt;Community and Security Risks in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1DKW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Influences market stability and trust&lt;/p&gt;
  &lt;p id=&quot;Q3ju&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;XMF3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/market-related-risks?referralId=4859741538501270514&quot; target=&quot;_blank&quot;&gt;Market-Related Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qilZ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It increases the risk of market manipulation&lt;/p&gt;
  &lt;p id=&quot;m1XH&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It indicates strong interest and potential liquidity.&lt;/p&gt;
  &lt;p id=&quot;6LJC&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-and-security-in-daos?referralId=10450324854265183332&quot; target=&quot;_blank&quot;&gt;Governance and Security in DAOs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;85Fj&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Centralization risks in smart contract&lt;/p&gt;
  &lt;p id=&quot;LlBJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;X0IQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/code-security?referralId=17965297244896798201&quot; target=&quot;_blank&quot;&gt;Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YvgI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and fix potential security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;mYrK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;svfN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/different-mechanisms-for-honeypot-scams?referralId=13131013968688026695&quot; target=&quot;_blank&quot;&gt;Different Mechanisms for Honeypot Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OS8B&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;An all-green chart with no sells&lt;/p&gt;
  &lt;p id=&quot;E4s2&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;False&lt;/p&gt;
  &lt;p id=&quot;7B9X&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-yourself-from-discord-scams?referralId=1042445682667554029&quot; target=&quot;_blank&quot;&gt;Protecting Yourself from Discord Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WrYD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Posting fake offers for free mints or airdrops to exploit FOMO (Fear Of Missing Out)&lt;/p&gt;
  &lt;p id=&quot;q8Bh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Reset your password as soon as possible and ensure 2FA is enabled&lt;/p&gt;
  &lt;p id=&quot;0vuW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-crypto-drainers?referralId=637350153324198711&quot; target=&quot;_blank&quot;&gt;Intro to Crypto Drainers&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KZ6x&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;DY8R&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;9syZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-and-avoiding-phishing-scams-in-x-replies?referralId=3468589033596343733&quot; target=&quot;_blank&quot;&gt;Identifying and Avoiding Phishing Scams in X Replies&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wZ7d&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Display names on X can be misused to impersonate official accounts, Scammers may disguise themselves using Gold Check accounts on X;&lt;/p&gt;
  &lt;p id=&quot;dFrr&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Same display name as the official account, A very similar username, Same account profile picture;&lt;/p&gt;
  &lt;p id=&quot;X051&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Users could always trust messages prior to the End of Thread&lt;/p&gt;
  &lt;p id=&quot;jCQx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-peel-chain-technique?referralId=6092805390136895237&quot; target=&quot;_blank&quot;&gt;Understanding the Peel Chain Technique&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eMCQ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A laundering technique dividing a large amount into small transactions&lt;/p&gt;
  &lt;p id=&quot;2Yd0&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To hide funds through a series of small transactions&lt;/p&gt;
  &lt;p id=&quot;g3Ri&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skynet-pulse-real-time-insights-by-security-experts?referralId=14801632575970093052&quot; target=&quot;_blank&quot;&gt;Skynet Pulse - Real-Time Insights by Security Experts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wILI&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt; By clicking on the heart icon at the top of the Skynet homepage&lt;/p&gt;
  &lt;p id=&quot;UQDQ&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;The project’s security score and a link to their Skynet profile&lt;/p&gt;
  &lt;p id=&quot;auNu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-formal-verification?referralId=13411599581235529462&quot; target=&quot;_blank&quot;&gt;Introduction to Formal Verification&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;GOvd&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;RC56&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Defining properties of contracts to be verified&lt;/p&gt;
  &lt;p id=&quot;jZ45&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-malicious-activity-on-websites-and-dapps?referralId=14391326312041387297&quot; target=&quot;_blank&quot;&gt;Identifying Malicious Activity on Websites &amp;amp; dApps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZRs3&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking&lt;/p&gt;
  &lt;p id=&quot;H5nM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The URL has subtle differences from the legitimate site, like extra characters or misspellings&lt;/p&gt;
  &lt;p id=&quot;WnN5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/losses-related-to-private-key-compromises?referralId=3379987647332406542&quot; target=&quot;_blank&quot;&gt;Losses Related to Private Key Compromises&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;El40&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Nearly $881 million across 47 incidents&lt;/p&gt;
  &lt;p id=&quot;BcD3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Binance&lt;/p&gt;
  &lt;p id=&quot;GydN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-practices-for-wallet-security?referralId=17172386887916103779&quot; target=&quot;_blank&quot;&gt;Best Practices for Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eArT&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;BJap&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The recipient’s wallet address to ensure it’s correct&lt;/p&gt;
  &lt;p id=&quot;pUz9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-user-security?referralId=7357995900959554027&quot; target=&quot;_blank&quot;&gt;Introduction to User Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZLG3&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds&lt;/p&gt;
  &lt;p id=&quot;u1Ry&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Two-Factor Authentication (2FA)&lt;/p&gt;
  &lt;p id=&quot;8eiv&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-of-diamond-agency-contract?referralId=3170796198508340067&quot; target=&quot;_blank&quot;&gt;Introduction of Diamond Agency Contract&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;RxmE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ke3E&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To prevent unauthorized access to privileged roles&lt;/p&gt;
  &lt;p id=&quot;8rg5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/top-compliance-risks-in-crypto?referralId=16399802578092275294&quot; target=&quot;_blank&quot;&gt;Top Compliance Risks in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;9V41&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Exposure to illicit activities&lt;/p&gt;
  &lt;p id=&quot;l0CT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;TtHz&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By maintaining a repository of global regulations&lt;/p&gt;
  &lt;p id=&quot;YnxB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-to-create-and-maintain-secure-passwords?referralId=13058038752038047591&quot; target=&quot;_blank&quot;&gt;How to Create and Maintain Secure Passwords&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;klDw&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To prevent hackers from accessing multiple accounts&lt;/p&gt;
  &lt;p id=&quot;e1MV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.A mix of upper and lower case letters, numbers, and special characters&lt;/p&gt;
  &lt;p id=&quot;nclr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Regularly to prevent expired passwords from being useful to hackers&lt;/p&gt;
  &lt;p id=&quot;REbL&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-and-preventing-sybil-attacks?referralId=15658778574720314134&quot; target=&quot;_blank&quot;&gt;Understanding and Preventing Sybil Attacks&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;1&lt;/strong&gt;.An attack where one person creates multiple identities to take over a network.&lt;br /&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above.&lt;br /&gt;&lt;strong&gt;3&lt;/strong&gt;.By making it impractical and costly for attackers to succeed.&lt;/p&gt;
  &lt;p id=&quot;W972&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/what-is-a-keylogger?referralId=8707739076659356886&quot; target=&quot;_blank&quot;&gt;What Is a Keylogger?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;W7ED&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Regularly check USB ports for unfamiliar devices&lt;/p&gt;
  &lt;p id=&quot;YcWZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stealing sensitive information&lt;/p&gt;
  &lt;p id=&quot;WBuH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-cryptocurrency-news-sources?referralId=16644553435179039608&quot; target=&quot;_blank&quot;&gt;Evaluating Cryptocurrency News Sources&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;igVI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;m6OZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3,4&lt;/p&gt;
  &lt;p id=&quot;Loek&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/stay-vigilant-on-browser-plugins?referralId=17950452728626331804&quot; target=&quot;_blank&quot;&gt;Stay Vigilant on Browser Plugins&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YnEh&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Using plugins promoted by users on social platforms&lt;/p&gt;
  &lt;p id=&quot;HUpj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;AiAG&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/empowering-your-web3-journey-with-advanced-security-tools?referralId=17249634678944098774&quot; target=&quot;_blank&quot;&gt;Empowering Your Web3 Journey with Advanced Security Tools&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;oISb&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Security Score&lt;/p&gt;
  &lt;p id=&quot;4JCM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Wallet Scan&lt;/p&gt;
  &lt;p id=&quot;OZhq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Real-time updates and trends from various sources&lt;/p&gt;
  &lt;p id=&quot;Rc03&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kyc-leaderboard-showcase?referralId=12215367053965547520&quot; target=&quot;_blank&quot;&gt;KYC Leaderboard Showcase&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YZw0&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Verified identities of key team members.&lt;/p&gt;
  &lt;p id=&quot;YaR6&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Full verification with low risk and high transparency&lt;/p&gt;
  &lt;p id=&quot;1Y6N&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-account-abstraction?referralId=15860065917261768287&quot; target=&quot;_blank&quot;&gt;Introduction to Account Abstraction&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VBCy&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Allowing for transactions to be conducted fully anonymously&lt;/p&gt;
  &lt;p id=&quot;njSz&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;WMpH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-the-dhs-is-stopping-ransomware-attacks?referralId=15603437711319365322&quot; target=&quot;_blank&quot;&gt;How the DHS is Stopping Ransomware Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lawp&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A type of malware that locks data and demands payment to unlock it.&lt;/p&gt;
  &lt;p id=&quot;SKH5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.537&lt;/p&gt;
  &lt;p id=&quot;gRVP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gathering evidence to prosecute hackers.&lt;/p&gt;
  &lt;p id=&quot;rsrQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-chain-hopping-and-crypto-money-laundering?referralId=6371277034313326130&quot; target=&quot;_blank&quot;&gt;Understanding Chain Hopping and Crypto Money Laundering&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;TpJE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By pooling and redistributing cryptocurrencies among multiple users&lt;/p&gt;
  &lt;p id=&quot;fgHz&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;WsKr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-etherscan?referralId=8842130191011626299&quot; target=&quot;_blank&quot;&gt;Exploring Etherscan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;sILI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A search engine for Ethereum&amp;#x27;s blockchain data&lt;/p&gt;
  &lt;p id=&quot;A39z&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Transaction history, token balances, and NFTs&lt;/p&gt;
  &lt;p id=&quot;XCEi&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;rnbb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-aml-and-its-role-in-crypto?referralId=15738321562498690349&quot; target=&quot;_blank&quot;&gt;Intro to AML and its Role in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gqdW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Placement&lt;/p&gt;
  &lt;p id=&quot;448R&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To verify users&amp;#x27; identities&lt;/p&gt;
  &lt;p id=&quot;x4BM&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It’s hard to trace transactions&lt;/p&gt;
  &lt;p id=&quot;1Icj&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/secure-use-of-exchanges?referralId=6815740301666868655&quot; target=&quot;_blank&quot;&gt;Secure Use of Exchanges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;s3hn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Two-Factor Authentication (2FA)&lt;/p&gt;
  &lt;p id=&quot;rUxi&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It stores your cryptocurrency offline, providing better security&lt;/p&gt;
  &lt;p id=&quot;NOPS&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Receiving an unsolicited email with a link to reset your password&lt;/p&gt;
  &lt;p id=&quot;zzfJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/dextools-real-time-trading-insights?referralId=4029549202211727132&quot; target=&quot;_blank&quot;&gt;DEXTools | Real-Time Trading Insights&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;39Ot&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To provide real-time analytics and insights for decentralized exchanges&lt;/p&gt;
  &lt;p id=&quot;GtWo&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Trending 24-Hour Charts&lt;/p&gt;
  &lt;p id=&quot;YWi6&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Reduced fees, access to premium features, and participation in governance&lt;/p&gt;
  &lt;p id=&quot;O0dY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/case-study-on-enhancing-security-for-app-chains?referralId=14561032952850902786&quot; target=&quot;_blank&quot;&gt;Case Study on Enhancing Security for App Chains&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;0PNn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All subsequent transactions failed while nodes appeared operational&lt;/p&gt;
  &lt;p id=&quot;5udo&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Limiting the total number of functions within a contract&lt;/p&gt;
  &lt;p id=&quot;dDv6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/soc-2-compliance-for-crypto-companies?referralId=8490561579313297340&quot; target=&quot;_blank&quot;&gt;SOC 2 Compliance for Crypto Companies&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;z7PU&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;TtrG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Security, Availability, Processing Integrity, Confidentiality, and Privacy&lt;/p&gt;
  &lt;p id=&quot;Ol3u&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It helps demonstrate a commitment to data security and builds trust with users&lt;/p&gt;
  &lt;p id=&quot;r8jy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-and-mitigating-51-attacks?referralId=18013243720688296512&quot; target=&quot;_blank&quot;&gt;Understanding and Mitigating 51% Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;c0Q7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.An attacker gains control of more than half of the network’s computational power&lt;/p&gt;
  &lt;p id=&quot;QhFY&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-spending of coins&lt;/p&gt;
  &lt;p id=&quot;5KGr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By distributing mining power widely and adjusting mining difficulty&lt;/p&gt;
  &lt;p id=&quot;u5YK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/setting-up-a-security-war-room?referralId=17867478544302965192&quot; target=&quot;_blank&quot;&gt;Setting Up a Security War Room&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;c8tw&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Secure messaging apps&lt;/p&gt;
  &lt;p id=&quot;cWCC&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;They identify weaknesses and improve team coordination&lt;/p&gt;
  &lt;p id=&quot;zSy5&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;s4kE&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/sim-swap-attacks?referralId=16139425250616761896&quot; target=&quot;_blank&quot;&gt;SIM Swap Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;RLf2&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Searching the dark web to find your previously leaked information; Browsing through your public social media accounts.&lt;/p&gt;
  &lt;p id=&quot;FCqX&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use authentication apps like Okta or Authy.&lt;/p&gt;
  &lt;p id=&quot;UfMq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/common-web3-phishing-methods?referralId=6867287355170951518&quot; target=&quot;_blank&quot;&gt;Common Web3 Phishing Methods&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kOeI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;fQPD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;XUQZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-against-social-engineering-attacks?referralId=17123893867364986672&quot; target=&quot;_blank&quot;&gt;Protecting Against Social Engineering Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;UNxB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Tricks aimed at specific individuals to steal sensitive information.&lt;/p&gt;
  &lt;p id=&quot;Gq1M&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.An email with urgent requests for confidential information.&lt;/p&gt;
  &lt;p id=&quot;iSte&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Verify the request using a trusted method.&lt;/p&gt;
  &lt;p id=&quot;YsIn&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/navigating-nft-security-and-avoiding-scams?referralId=3907516863440339025&quot; target=&quot;_blank&quot;&gt;Navigating NFT Security and Avoiding Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;aS2D&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By checking the creator&amp;#x27;s profile and NFT metadata.&lt;/p&gt;
  &lt;p id=&quot;pNdy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.In a hardware wallet that supports NFTs.&lt;/p&gt;
  &lt;p id=&quot;w43a&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Enabling two-factor authentication on accounts.&lt;/p&gt;
  &lt;p id=&quot;4iI7&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-rating-for-pre-launch-projects?referralId=14542761996400421215&quot; target=&quot;_blank&quot;&gt;Security Rating for Pre-Launch Projects&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WHrK&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Market Stability&lt;/p&gt;
  &lt;p id=&quot;VccA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stage 2&lt;/p&gt;
  &lt;p id=&quot;GEZq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;GFdG&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-token-holder-analysis?referralId=11249118686618612056&quot; target=&quot;_blank&quot;&gt;Insights on Token Holder Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZAbr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Ywpo&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Total Value Locked (TVL)&lt;/p&gt;
  &lt;p id=&quot;vMkw&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.High percentage on project owner holding&lt;/p&gt;
  &lt;p id=&quot;PUNj&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-activity-monitoring?referralId=10841772136631773812&quot; target=&quot;_blank&quot;&gt;Governance Activity Monitoring&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KEWL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It reflects the level of governance activity in comparison to other Web3 projects by aggregating various signals&lt;/p&gt;
  &lt;p id=&quot;Hdlh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;p0AP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Project&amp;#x27;s financial performance&lt;/p&gt;
  &lt;p id=&quot;Rznl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/github-monitoring-for-better-code-security?referralId=2947965897230806152&quot; target=&quot;_blank&quot;&gt;GitHub Monitoring for Better Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3WUS&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;UEPM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;iJDu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False - Introducing new code may also introduce bugs and vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;V0iR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security-via-website-scan?referralId=16558688121911411307&quot; target=&quot;_blank&quot;&gt;Operational Security via Website Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gPih&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Security; DNS Health; Application Security/&lt;/p&gt;
  &lt;p id=&quot;XmE0&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ML5Z&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Penetration Testing&lt;/p&gt;
  &lt;p id=&quot;Kgzs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-market-analytics?referralId=5200565301090517712&quot; target=&quot;_blank&quot;&gt;Insights on Market Analytics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Zvxn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fully diluted market cap&lt;/p&gt;
  &lt;p id=&quot;6FKR&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt; 1,2,3&lt;/p&gt;
  &lt;p id=&quot;5rA8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;TLL2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-economic-exploits-and-tokenomics?referralId=2877488948817488841&quot; target=&quot;_blank&quot;&gt;Understanding Economic Exploits and Tokenomics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VGKL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Manipulating financial mechanisms for profit&lt;/p&gt;
  &lt;p id=&quot;eEQh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It influences decentralization and market stability&lt;/p&gt;
  &lt;p id=&quot;FALv&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They prevent token supply from being immediately flooded&lt;/p&gt;
  &lt;p id=&quot;uDKt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-your-postgresql-database-from-cryptojacking?referralId=7883181834866710561&quot; target=&quot;_blank&quot;&gt;Protecting Your PostgreSQL Database from Cryptojacking&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cNeT&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;8pgh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Creates a new user account with high privileges&lt;/p&gt;
  &lt;p id=&quot;FzCW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Using strong, unique passwords and regular system updates&lt;/p&gt;
  &lt;p id=&quot;a5O8&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-soft-rug-vs-hard-rug-pulls?referralId=9963276234478114641&quot; target=&quot;_blank&quot;&gt;Understanding Soft Rug vs. Hard Rug Pulls&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;X8Jj&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Developers abandoning and removing liquidity, leaving investors with worthless tokens&lt;/p&gt;
  &lt;p id=&quot;ONGR&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Gradual selling of tokens by the development team&lt;/p&gt;
  &lt;p id=&quot;tW7h&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hackers-infiltrating-crypto-job-boards?referralId=6430472449098112400&quot; target=&quot;_blank&quot;&gt;Hackers Infiltrating Crypto Job Boards&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;sNjK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$600 million&lt;/p&gt;
  &lt;p id=&quot;tQ8s&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.4,000&lt;/p&gt;
  &lt;p id=&quot;NJj9&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Refusing to turn on the camera&lt;/p&gt;
  &lt;p id=&quot;A29J&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/importance-of-bug-bounty-programs-in-web3?referralId=13278395323435539940&quot; target=&quot;_blank&quot;&gt;Importance of Bug Bounty Programs in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;I05s&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;d246&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use open source expertise for security&lt;/p&gt;
  &lt;p id=&quot;varP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. 1,2,3,4&lt;/p&gt;
  &lt;p id=&quot;NXok&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-airdrop-scams?referralId=12461496521175762681&quot; target=&quot;_blank&quot;&gt;Intro to Airdrop Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ppeL&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;False - projects never ask for such information.&lt;/p&gt;
  &lt;p id=&quot;rcrM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;DgVY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cold-wallets?referralId=14163199852116713909&quot; target=&quot;_blank&quot;&gt;Cold Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;BqNj&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Storing your crypto assets offline for safe and long-term storage&lt;/p&gt;
  &lt;p id=&quot;rCOE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paper Wallet, Hardware Wallet, Offline Software Wallet&lt;/p&gt;
  &lt;p id=&quot;8fFl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Always purchase a wallet directly from the manufacturer, Check on hardware wallet&amp;#x27;s security features&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;sI6j&quot; data-align=&quot;center&quot;&gt;Security Analysis&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;JFek&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/tornado-cash-post-sanctions-usage-and-risks?referralId=1913976389191718395&quot; target=&quot;_blank&quot;&gt;Tornado Cash – Post-Sanctions Usage and Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ixBS&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Breaks transaction links for privacy&lt;/p&gt;
  &lt;p id=&quot;YwyZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Zero-Knowledge Proofs&lt;/p&gt;
  &lt;p id=&quot;61Wr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Legitimate usage increased, illicit usage decreased&lt;/p&gt;
  &lt;p id=&quot;Qj7L&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Interacting with sanctioned entities or wallets&lt;/p&gt;
  &lt;p id=&quot;pEEO&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-bitcoin-locktime?referralId=991043809006118662&quot; target=&quot;_blank&quot;&gt;Understanding Bitcoin Locktime&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;l4bm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Delays transaction confirmation until a set time/block&lt;/p&gt;
  &lt;p id=&quot;ixOa&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Time-delayed payments or transaction scheduling&lt;/p&gt;
  &lt;p id=&quot;3QPC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Relative locktime depends on previous transaction timing&lt;/p&gt;
  &lt;p id=&quot;MZvM&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.It supports secure channel closures and penalty mechanisms&lt;/p&gt;
  &lt;p id=&quot;p0AD&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/secure-randomness-in-smart-contracts?referralId=17752882708728480429&quot; target=&quot;_blank&quot;&gt;Secure Randomness in Smart Contracts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;o7Wx&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Because smart contracts are deterministic and public&lt;/p&gt;
  &lt;p id=&quot;Kd4c&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Front-running and manipulation&lt;/p&gt;
  &lt;p id=&quot;L1oT&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Random values with cryptographic proofs&lt;/p&gt;
  &lt;p id=&quot;ppQa&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Requires multiple steps and user coordination&lt;/p&gt;
  &lt;p id=&quot;rKkX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wrench-attacks-in-crypto?referralId=11355515245248142719&quot; target=&quot;_blank&quot;&gt;Wrench Attacks in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;g3Pu&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.On-chain wealth is transparent and crypto is irreversible&lt;/p&gt;
  &lt;p id=&quot;jmIj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Posting wallet balances online&lt;/p&gt;
  &lt;p id=&quot;pBaC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It prevents any single person from accessing funds alone&lt;/p&gt;
  &lt;p id=&quot;vVHD&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Buys time before large withdrawals execute&lt;/p&gt;
  &lt;p id=&quot;x1ee&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/slashing-and-validator-security-in-pos-chains?referralId=6846934503480404419&quot; target=&quot;_blank&quot;&gt;Slashing and Validator Security in PoS Chains&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;1&lt;/strong&gt;.Punish malicious or faulty validator behavior&lt;/p&gt;
  &lt;p id=&quot;3BdD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-signing blocks&lt;/p&gt;
  &lt;p id=&quot;UBLh&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Because they may share losses if their validator is slashed&lt;/p&gt;
  &lt;p id=&quot;lPRv&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Block explorers and validator dashboards&lt;/p&gt;
  &lt;p id=&quot;GLIS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/flash-loan-attacks-and-protocol-level-defenses?referralId=17933871821450313154&quot; target=&quot;_blank&quot;&gt;Flash Loan Attacks and Protocol-Level Defenses&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;xc27&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.They let attackers act with large sums instantly and risk-free&lt;/p&gt;
  &lt;p id=&quot;Cgzc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Weak oracles and logic assumptions&lt;/p&gt;
  &lt;p id=&quot;MpMR&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Use time-weighted average prices and oracle feeds&lt;/p&gt;
  &lt;p id=&quot;EYRB&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Sudden large loans and multi-protocol interactions in a single transaction&lt;/p&gt;
  &lt;p id=&quot;IoXI&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/sola-incident-analysis?referralId=5015688992758153723&quot; target=&quot;_blank&quot;&gt;Sola Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;HTlA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Public withdraw function with no access control&lt;/p&gt;
  &lt;p id=&quot;eAKU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Via a flash swap&lt;/p&gt;
  &lt;p id=&quot;oFRY&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Tornado Cash&lt;/p&gt;
  &lt;p id=&quot;fRk0&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.withdrawToken()&lt;/p&gt;
  &lt;p id=&quot;kH4i&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mobius-token-exploit-security-awareness-module?referralId=15003818248042845190&quot; target=&quot;_blank&quot;&gt;Mobius Token Exploit: Security Awareness Module&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;DUp6&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.0.001 BNB&lt;/p&gt;
  &lt;p id=&quot;hFbQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Tornado Cash&lt;/p&gt;
  &lt;p id=&quot;RJGC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.46&lt;/p&gt;
  &lt;p id=&quot;ZuHm&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Conduct thorough smart contract audits&lt;/p&gt;
  &lt;p id=&quot;OjuQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mastering-dexscan-for-crypto-traders?referralId=9927089477542684033&quot; target=&quot;_blank&quot;&gt;Mastering DexScan for Crypto Traders&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YMpN&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Monitoring decentralized exchanges across blockchains&lt;/p&gt;
  &lt;p id=&quot;3UEI&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Profitable trader wallets and their trading history&lt;/p&gt;
  &lt;p id=&quot;W5UD&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Pool TVL, FDV, and 24H Transactions&lt;/p&gt;
  &lt;p id=&quot;zt1V&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Trending doesn’t mean fundamentally strong&lt;/p&gt;
  &lt;p id=&quot;xv10&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/crypto-etfs-bitcoin-and-ethereum?referralId=18325906932837362592&quot; target=&quot;_blank&quot;&gt;Crypto ETFs (Bitcoin &amp;amp; Ethereum)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lmVr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Actual crypto assets like Bitcoin&lt;/p&gt;
  &lt;p id=&quot;ease&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Market inefficiency or hype&lt;/p&gt;
  &lt;p id=&quot;YVUl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Contract rollovers can create volatility&lt;/p&gt;
  &lt;p id=&quot;EfZf&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.AUM, NAV tracking, fees, and custodian reputation&lt;/p&gt;
  &lt;p id=&quot;QA8x&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ai-agents-in-cryptocurrency?referralId=1532712642024568252&quot; target=&quot;_blank&quot;&gt;AI Agents in Cryptocurrency&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OctM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Autonomous decision-making based on data&lt;/p&gt;
  &lt;p id=&quot;yAkL&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Expanded attack surface due to complex logic&lt;/p&gt;
  &lt;p id=&quot;UUA7&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Oracle feeds and on-chain data&lt;/p&gt;
  &lt;p id=&quot;yrpP&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.They enable automation and scale in DeFi&lt;/p&gt;
  &lt;p id=&quot;4D5e&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-altcoin-season-index?referralId=16482011739036528148&quot; target=&quot;_blank&quot;&gt;The Altcoin Season Index&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;pwr3&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.75–100&lt;/p&gt;
  &lt;p id=&quot;sfz8&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The number of top 50 altcoins outperforming Bitcoin over 90 days&lt;/p&gt;
  &lt;p id=&quot;6ea9&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Increased phishing and rug pulls&lt;/p&gt;
  &lt;p id=&quot;Ecuf&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Bitcoin Dominance&lt;/p&gt;
  &lt;p id=&quot;9KLS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cork-protocol-incident-analysis-may-28-2025?referralId=9135472945868722231&quot; target=&quot;_blank&quot;&gt;Cork Protocol Incident Analysis (May 28, 2025)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;rIKX&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Lack of parameter validation in hook contracts&lt;/p&gt;
  &lt;p id=&quot;4jG5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Cover Tokens and Depeg Swaps&lt;/p&gt;
  &lt;p id=&quot;rR03&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.An external smart contract attached to a pool&lt;/p&gt;
  &lt;p id=&quot;60w3&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.If they use unvalidated external contracts and hooks&lt;/p&gt;
  &lt;p id=&quot;FsQy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/crypto-data-breaches?referralId=12785499237857860146&quot; target=&quot;_blank&quot;&gt;Crypto Data Breaches&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iERL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Stolen data can lead to identity theft and permanent loss of funds&lt;/p&gt;
  &lt;p id=&quot;v3H1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use a hardware wallet&lt;/p&gt;
  &lt;p id=&quot;8ihd&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Blockchain transactions are irreversible&lt;/p&gt;
  &lt;p id=&quot;G7b8&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.They hold large amounts of user data and funds&lt;/p&gt;
  &lt;p id=&quot;bFQO&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/distributed-key-generation-dkg?referralId=3791207186045529208&quot; target=&quot;_blank&quot;&gt;Distributed Key Generation (DKG)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;rfqW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To generate a shared private key without any single party knowing it&lt;/p&gt;
  &lt;p id=&quot;yFJB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.A dealer might give out inconsistent or invalid shares&lt;/p&gt;
  &lt;p id=&quot;zHHN&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.A threshold number of shares (t of n)&lt;/p&gt;
  &lt;p id=&quot;C7WP&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Eliminating single points of failure&lt;/p&gt;
  &lt;p id=&quot;thSo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/h1-2025-certik-hack3d-report?referralId=8850599244528312425&quot; target=&quot;_blank&quot;&gt;H1 2025 CertiK Hack3d Report&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YYJ9&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;iuOI&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Bybit and Cetus&lt;/p&gt;
  &lt;p id=&quot;wb1V&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Over $2.47 billion&lt;/p&gt;
  &lt;p id=&quot;O93D&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/crypto-derivatives-market?referralId=17002247590457002525&quot; target=&quot;_blank&quot;&gt;Crypto Derivatives Market&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;hxi6&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A contract based on the price of a crypto asset&lt;/p&gt;
  &lt;p id=&quot;PfrG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They provide leverage, risk management, and price discovery&lt;/p&gt;
  &lt;p id=&quot;vde2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Instant liquidation from small price movements&lt;/p&gt;
  &lt;p id=&quot;kmdv&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Strong bullish sentiment and over-leveraged longs&lt;/p&gt;
  &lt;p id=&quot;yOyb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-stock-to-flow-s2f-chart-for-bitcoin?referralId=528225785947777299&quot; target=&quot;_blank&quot;&gt;Understanding the Stock-to-Flow (S2F) Chart for Bitcoin&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cib2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Asset scarcity by comparing existing supply to production rate&lt;/p&gt;
  &lt;p id=&quot;vm76&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Bitcoin halving&lt;/p&gt;
  &lt;p id=&quot;6kwc&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It helps understand Bitcoin&amp;#x27;s scarcity and monetary design&lt;/p&gt;
  &lt;p id=&quot;3bAl&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.It gets cut in half&lt;/p&gt;
  &lt;p id=&quot;po3M&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-crypto-fear-and-greed-index?referralId=8604918886293826134&quot; target=&quot;_blank&quot;&gt;The Crypto Fear &amp;amp; Greed Index&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2i05&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To measure investor sentiment and emotional extremes&lt;/p&gt;
  &lt;p id=&quot;PdsV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.NFT sales volume&lt;/p&gt;
  &lt;p id=&quot;GUCC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Scams and emotional decisions are more likely&lt;/p&gt;
  &lt;p id=&quot;yZDD&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.It primarily reflects Bitcoin data and is updated daily&lt;/p&gt;
  &lt;p id=&quot;lfDx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pectras-eip-7702-and-its-security-implications-across-evm-chains?referralId=4138078950393359000&quot; target=&quot;_blank&quot;&gt;Pectra’s EIP-7702 and Its Security Implications Across EVM Chains&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;SNxh&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It can execute code by delegating to a smart contract.&lt;/p&gt;
  &lt;p id=&quot;hTGR&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It can be bypassed by a delegated EOA (i.e. no longer safe)&lt;/p&gt;
  &lt;p id=&quot;vSGG&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It returns &amp;gt;0, since the EOA now has code&lt;/p&gt;
  &lt;p id=&quot;1qSw&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.It can invoke the delegate’s fallback function, potentially using extra gas or reverting&lt;/p&gt;
  &lt;p id=&quot;YYX2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/securing-defi-oracles-critical-role-and-the-twap-vulnerability?referralId=9428507636222096359&quot; target=&quot;_blank&quot;&gt;Securing DeFi: Oracle&amp;#x27;s Critical Role and the TWAP Vulnerability&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qDzt&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To provide external data to smart contracts&lt;/p&gt;
  &lt;p id=&quot;ufhv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They can be manipulated if the price is skewed throughout the averaging period&lt;/p&gt;
  &lt;p id=&quot;riKG&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By manipulating the price of the MNGO token&lt;/p&gt;
  &lt;p id=&quot;pNi8&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Ignoring anomalies in price data&lt;/p&gt;
  &lt;p id=&quot;rVFD&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/european-unions-forthcoming-anti-money-laundering-regulation-amlr?referralId=13846771852502585861&quot; target=&quot;_blank&quot;&gt;European Union&amp;#x27;s forthcoming Anti-Money Laundering Regulation (AMLR)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dHcq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To enhance financial transparency and combat illicit activities&lt;/p&gt;
  &lt;p id=&quot;6AK5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Anonymous crypto accounts and wallets&lt;/p&gt;
  &lt;p id=&quot;qtXA&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Anti-Money Laundering Authority (AMLA)&lt;/p&gt;
  &lt;p id=&quot;rAMO&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Monero (XMR)&lt;/p&gt;
  &lt;p id=&quot;RgOe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/crypto-token-unlocks-and-vesting-schedules?referralId=12985226626357108331&quot; target=&quot;_blank&quot;&gt;Crypto Token Unlocks and Vesting Schedules&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;h2Cc&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To prevent sudden market dumps by releasing tokens gradually&lt;/p&gt;
  &lt;p id=&quot;oTKH&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To anticipate potential price impacts from token releases&lt;/p&gt;
  &lt;p id=&quot;v2zr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Increased selling pressure and potential price volatility&lt;/p&gt;
  &lt;p id=&quot;39tu&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Diversifying their investment portfolio&lt;/p&gt;
  &lt;p id=&quot;7A5S&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/model-context-protocol-mcp-in-crypto-and-ai?referralId=16737838682331640421&quot; target=&quot;_blank&quot;&gt;Model Context Protocol (MCP) in Crypto and AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;mIYq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To standardize AI interactions with external tools and data sources&lt;/p&gt;
  &lt;p id=&quot;mtgn&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Tool poisoning attacks&lt;/p&gt;
  &lt;p id=&quot;rtMT&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Implementing robust authentication and authorization&lt;/p&gt;
  &lt;p id=&quot;5ft5&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By autonomously managing wallets and executing trades&lt;/p&gt;
  &lt;p id=&quot;2dWh&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/tokenized-real-estate?referralId=13760060431609116548&quot; target=&quot;_blank&quot;&gt;Tokenized Real Estate&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VLPm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Enhanced liquidity and accessibility&lt;/p&gt;
  &lt;p id=&quot;EhBe&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Smart contracts&lt;/p&gt;
  &lt;p id=&quot;oieP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Regulatory uncertainty&lt;/p&gt;
  &lt;p id=&quot;efw8&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Employing secure wallets and platforms&lt;/p&gt;
  &lt;p id=&quot;y4LN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/telegram-web3-crypto-scams?referralId=16799880577471889554&quot; target=&quot;_blank&quot;&gt;Telegram Web3 Crypto Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;338u&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fake verification bots&lt;/p&gt;
  &lt;p id=&quot;QMlb&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Fake login pages capturing seed phrases&lt;/p&gt;
  &lt;p id=&quot;JSVh&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Using burner wallets&lt;/p&gt;
  &lt;p id=&quot;365a&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Checking for third-party verification badges&lt;/p&gt;
  &lt;p id=&quot;Dfyu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evm-cosmos-convergence-research-part-1?referralId=17130141282482930278&quot; target=&quot;_blank&quot;&gt;EVM – Cosmos Convergence Research (Part 1)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;elgi&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By inspecting each message’s type URL for an ExtensionOptionsEthereumTx flag&lt;/p&gt;
  &lt;p id=&quot;ASFH&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.EVM refunds unused gas; Cosmos does not&lt;/p&gt;
  &lt;p id=&quot;ssGW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.RejectMessagesDecorator&lt;/p&gt;
  &lt;p id=&quot;5xSK&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.It bypasses ante handlers and allows inflated gas refunds&lt;/p&gt;
  &lt;p id=&quot;1ACx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/h-r-1122-cbdc-anti-surveillance-state-act?referralId=15924001790339385264&quot; target=&quot;_blank&quot;&gt;H.R.1122 - CBDC Anti-Surveillance State Act&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;e9eZ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To provide clarity on how federal securities laws apply to crypto assets and enhance investor protection&lt;/p&gt;
  &lt;p id=&quot;Ftos&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Tailoring disclosures to the issuer’s size and specific circumstances&lt;/p&gt;
  &lt;p id=&quot;xFgV&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The rights, obligations, and preferences of security holders, along with technical specifications and supply details&lt;/p&gt;
  &lt;p id=&quot;YXm8&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Investor protection and market integrity&lt;/p&gt;
  &lt;p id=&quot;Nv8P&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ethereums-pectra-upgrade?referralId=1622160822334157699&quot; target=&quot;_blank&quot;&gt;Ethereum&amp;#x27;s Pectra Upgrade&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OVQd&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Multi-operation transactions&lt;/p&gt;
  &lt;p id=&quot;BduA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verkle trees&lt;/p&gt;
  &lt;p id=&quot;wg2z&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Hoodi&lt;/p&gt;
  &lt;p id=&quot;gSgj&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.May 7, 2025&lt;/p&gt;
  &lt;p id=&quot;TyGZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/uniswap-v4-hooks-security-considerations?referralId=11605993385321669472&quot; target=&quot;_blank&quot;&gt;Uniswap V4: Hooks Security Considerations&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1uvu&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To attach custom logic at various stages of a liquidity pool&amp;#x27;s lifecycle&lt;/p&gt;
  &lt;p id=&quot;k0oZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By examining the least significant bits of the hook&amp;#x27;s deployed address&lt;/p&gt;
  &lt;p id=&quot;94al&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.To prevent transaction failures due to invalid hook responses&lt;/p&gt;
  &lt;p id=&quot;r2EV&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By causing permanent loss of user funds&lt;/p&gt;
  &lt;p id=&quot;TTKk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/move-for-solidity-developers-i-storage-and-access-control?referralId=9928211782850051127&quot; target=&quot;_blank&quot;&gt;Move for Solidity Developers I: Storage and Access Control&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Hq9G&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Move uses the signer type, while Solidity relies on msg.sender.&lt;/p&gt;
  &lt;p id=&quot;8wu3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Organized by accounts, with each holding specific resources.&lt;/p&gt;
  &lt;p id=&quot;BrZu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Sui Move uses an object-centric model, while Aptos Move uses an account-based model.&lt;/p&gt;
  &lt;p id=&quot;kVIe&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.To signify permission to perform certain actions.&lt;/p&gt;
  &lt;p id=&quot;HtTp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-hong-kong-sfc-a-s-p-i-re-roadmap-for-virtual-assets?referralId=13377905690798366627&quot; target=&quot;_blank&quot;&gt;Understanding the Hong Kong SFC A-S-P-I-Re Roadmap for Virtual Assets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;8GYg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Developing dynamic custody technologies&lt;/p&gt;
  &lt;p id=&quot;sELV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Diversifying VA offerings such as professional investor frameworks and staking services&lt;/p&gt;
  &lt;p id=&quot;zaMf&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Fraud and market misconduct&lt;/p&gt;
  &lt;p id=&quot;VWKS&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.A clearer, more comprehensive regulatory framework&lt;/p&gt;
  &lt;p id=&quot;nzBz&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/a-new-era-in-web3-fundraising-opportunities-and-challenges?referralId=16258062729091438754&quot; target=&quot;_blank&quot;&gt;A New Era in Web3 Fundraising — Opportunities and Challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FIFA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To process transactions and secure the network&lt;/p&gt;
  &lt;p id=&quot;blxD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Implementation of tiered node pricing systems&lt;/p&gt;
  &lt;p id=&quot;uvNP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Uncertain token generation events and lock-up periods&lt;/p&gt;
  &lt;p id=&quot;sH8u&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Due to the model&amp;#x27;s alignment with long-term infrastructure development&lt;/p&gt;
  &lt;p id=&quot;9LV0&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/interoperable-programmable-token-design-on-cardano-cip-113-143?referralId=17560965937834688800&quot; target=&quot;_blank&quot;&gt;Interoperable Programmable Token Design on Cardano (CIP-113/143)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1Hm1&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To create a unified standard for interoperable programmable tokens on Cardano&lt;/p&gt;
  &lt;p id=&quot;no9S&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By using a consistent address scheme that allows wallets to display balances as if in an account&lt;/p&gt;
  &lt;p id=&quot;IYhy&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It avoids the “approve/allowance” pattern, reducing certain types of exploits&lt;/p&gt;
  &lt;p id=&quot;Uuiu&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Introduction of administrative controls that reintroduce an element of trust&lt;/p&gt;
  &lt;p id=&quot;OW2f&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-mim-spell-exploit-on-25-march-2025?referralId=5375273021636387516&quot; target=&quot;_blank&quot;&gt;The MIM Spell Exploit on 25 March 2025&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ze0F&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$12.9M&lt;/p&gt;
  &lt;p id=&quot;p9PH&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.RouterOrder and CauldronV4&lt;/p&gt;
  &lt;p id=&quot;FkWt&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Not updating the public ‘inputAmount’ variable in RouterOrder&lt;/p&gt;
  &lt;p id=&quot;yzLW&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.They offered a 20% bounty for the return of the stolen funds&lt;/p&gt;
  &lt;p id=&quot;FxJF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/eavesdropping-attack?referralId=3498617717741036705&quot; target=&quot;_blank&quot;&gt;Eavesdropping Attack&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yS7h&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Unauthorized interception of network communications&lt;/p&gt;
  &lt;p id=&quot;pDby&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They are often unsecured, allowing easy interception of data&lt;/p&gt;
  &lt;p id=&quot;sjTt&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Man-in-the-middle attack&lt;/p&gt;
  &lt;p id=&quot;VVs1&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.It creates an encrypted tunnel for data transmission&lt;/p&gt;
  &lt;p id=&quot;BfiC&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/eclipse-attack?referralId=10881001238989758726&quot; target=&quot;_blank&quot;&gt;Eclipse Attack&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Eqbs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To isolate a node and control its network view&lt;/p&gt;
  &lt;p id=&quot;mlA1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By flooding the target node with connections from malicious nodes&lt;/p&gt;
  &lt;p id=&quot;bnVe&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Eclipse attacks isolate a node; Sybil attacks involve creating fake identities&lt;/p&gt;
  &lt;p id=&quot;WHvh&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Connecting to a diverse set of randomly selected peers&lt;/p&gt;
  &lt;p id=&quot;EE3q&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/staff-accounting-bulletin-no-122?referralId=1109659202141131146&quot; target=&quot;_blank&quot;&gt;Staff Accounting Bulletin No. 122&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lY0f&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To rescind the guidance provided in SAB 121&lt;/p&gt;
  &lt;p id=&quot;GbGk&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Recording safeguarding obligations as liabilities at fair value&lt;/p&gt;
  &lt;p id=&quot;msmp&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It allows entities to use their own risk assessments&lt;/p&gt;
  &lt;p id=&quot;2OWR&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Increased balance sheet liabilities for institutions&lt;/p&gt;
  &lt;p id=&quot;Ane9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pig-butchering?referralId=5522510692010273405&quot; target=&quot;_blank&quot;&gt;Pig Butchering&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JeNr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Building trust over time to defraud victims&lt;/p&gt;
  &lt;p id=&quot;ug73&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Sharing fabricated success stories&lt;/p&gt;
  &lt;p id=&quot;yS2e&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Cease communication and report the incident&lt;/p&gt;
  &lt;p id=&quot;dLYa&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.They involve human trafficking and forced labor&lt;/p&gt;
  &lt;p id=&quot;4mLE&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/decentralized-identity-and-privacy?referralId=1813943135932107414&quot; target=&quot;_blank&quot;&gt;Decentralized Identity and Privacy&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;NQmT&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.User autonomy over personal data&lt;/p&gt;
  &lt;p id=&quot;PFam&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Linkability leading to user profiling&lt;/p&gt;
  &lt;p id=&quot;ZFpb&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By allowing verification without revealing actual data&lt;/p&gt;
  &lt;p id=&quot;5Eoj&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Inability to verify identities; Exposure of email addresses through brute-force attacks&lt;/p&gt;
  &lt;p id=&quot;kI0L&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/crypto-mixers-and-cross-chain-bridges?referralId=10483081002240141886&quot; target=&quot;_blank&quot;&gt;Crypto Mixers and Cross-Chain Bridges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;HYgV&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To obfuscate the origin of cryptocurrency transactions&lt;/p&gt;
  &lt;p id=&quot;O20C&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By enabling the transfer of assets between different blockchains, making tracking more difficult&lt;/p&gt;
  &lt;p id=&quot;UUdY&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Lazarus Group&lt;/p&gt;
  &lt;p id=&quot;SwA7&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Increasing transaction fees for all users&lt;/p&gt;
  &lt;p id=&quot;5z8C&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/smart-contract-upgrade-exploits?referralId=11323100274464528597&quot; target=&quot;_blank&quot;&gt;Smart Contract Upgrade Exploits&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;4Wrs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Proxy patterns separating logic and storage&lt;/p&gt;
  &lt;p id=&quot;LPZh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Storage collisions leading to unauthorized control&lt;/p&gt;
  &lt;p id=&quot;wet2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Enforcing strict access controls and performing thorough audits&lt;/p&gt;
  &lt;p id=&quot;ZtQU&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Implementing formal verification and continuous monitoring&lt;/p&gt;
  &lt;p id=&quot;Tnec&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/oracle-manipulation-in-defi?referralId=10310144808676617695&quot; target=&quot;_blank&quot;&gt;Oracle Manipulation in DeFi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;fCBC&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To provide real-world data to smart contracts&lt;/p&gt;
  &lt;p id=&quot;6WDD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Data spoofing&lt;/p&gt;
  &lt;p id=&quot;sKwV&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By reducing single points of failure and cross-verifying data&lt;/p&gt;
  &lt;p id=&quot;gf7p&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Incorporating fallback mechanisms that cross-check data from multiple sources&lt;/p&gt;
  &lt;p id=&quot;3wUv&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-q1-2025-quest?referralId=7973955255634608113&quot; target=&quot;_blank&quot;&gt;HACK3D Q1 2025 Quest&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Wlut&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$1.67 billion&lt;/p&gt;
  &lt;p id=&quot;OQAi&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Wallet Compromise&lt;/p&gt;
  &lt;p id=&quot;Ka4J&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Ethereum&lt;/p&gt;
  &lt;p id=&quot;1c4i&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.The U.S. launched a Crypto Task Force and formed a Strategic Cryptocurrency Reserve&lt;/p&gt;
  &lt;p id=&quot;kb7n&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/nft-smart-contract-vulnerabilities?referralId=1593717722669085226&quot; target=&quot;_blank&quot;&gt;NFT Smart Contract Vulnerabilities&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;UaVJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Lack of proper access controls&lt;/p&gt;
  &lt;p id=&quot;kBlT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Employing safe libraries like OpenZeppelin&lt;/p&gt;
  &lt;p id=&quot;Cfc1&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They identify vulnerabilities through community testing&lt;/p&gt;
  &lt;p id=&quot;nynE&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.MythX&lt;/p&gt;
  &lt;p id=&quot;TJyb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/enhanced-safeguarding-for-crypto-wallets?referralId=7806694598823648498&quot; target=&quot;_blank&quot;&gt;Enhanced Safeguarding for Crypto Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6GTZ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Using multi-factor authentication (MFA) and strong, unique passwords&lt;/p&gt;
  &lt;p id=&quot;BDrR&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Keeping your recovery seed phrase offline in a secure location&lt;/p&gt;
  &lt;p id=&quot;5m99&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Requiring multiple approvals before a transaction can be executed&lt;/p&gt;
  &lt;p id=&quot;uoPN&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Using cold storage for most funds, a hot wallet for daily transactions, and multi-sig for critical accounts&lt;/p&gt;
  &lt;p id=&quot;5KHt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mev-and-trading-bots-on-solana?referralId=1051063345835045038&quot; target=&quot;_blank&quot;&gt;MEV and Trading Bots on Solana&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Tz1P&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By reordering, inserting, or censoring transactions&lt;/p&gt;
  &lt;p id=&quot;pIHL&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Using private transaction pools and setting strict slippage limits&lt;/p&gt;
  &lt;p id=&quot;iMuW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Sandwich attacks&lt;/p&gt;
  &lt;p id=&quot;RHE4&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By routing orders through multiple steps to conceal trading activity.&lt;/p&gt;
  &lt;p id=&quot;73fr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/comparing-solana-and-ethereum-transaction-processing-models?referralId=6674005408050335631&quot; target=&quot;_blank&quot;&gt;Comparing Solana and Ethereum Transaction Processing Models&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;9yGK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Use of Proof-of-History (PoH) and parallel processing&lt;/p&gt;
  &lt;p id=&quot;tU0O&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Sequential and limited by gas fees&lt;/p&gt;
  &lt;p id=&quot;DlIL&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Front-running attacks&lt;/p&gt;
  &lt;p id=&quot;YdNJ&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Regularly auditing smart contracts and staying updated on network security improvements&lt;/p&gt;
  &lt;p id=&quot;lSkK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-psychology-of-crypto-scams-why-do-people-keep-falling-for-them?referralId=8553414051689550067&quot; target=&quot;_blank&quot;&gt;The Psychology of Crypto Scams: Why Do People Keep Falling for Them?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;f0sn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Scammers exploit emotions like fear and greed.&lt;/p&gt;
  &lt;p id=&quot;G0QS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.A limited-time investment opportunity that requires fast action.&lt;/p&gt;
  &lt;p id=&quot;WeRU&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They use fake testimonials and endorsements.&lt;/p&gt;
  &lt;p id=&quot;FviS&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Check the official wallet provider’s website and support channels.&lt;/p&gt;
  &lt;p id=&quot;hFVN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/crypto-and-ai-can-artificial-intelligence-protect-or-steal-your-crypto?referralId=9733238082970995699&quot; target=&quot;_blank&quot;&gt;Crypto and AI: Can Artificial Intelligence Protect or Steal Your Crypto?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;fXeg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.AI-generated deepfake videos can be used to impersonate crypto influencers.&lt;/p&gt;
  &lt;p id=&quot;WOz2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By tracking keystrokes and replacing copied wallet addresses&lt;/p&gt;
  &lt;p id=&quot;43U8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.AI writes highly convincing fake emails and messages.&lt;/p&gt;
  &lt;p id=&quot;xAVv&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Always double-check messages from crypto exchanges.&lt;/p&gt;
  &lt;p id=&quot;YdDE&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cryptocurrency-and-iot-security-how-smart-devices-can-be-hacked?referralId=5311155142505724476&quot; target=&quot;_blank&quot;&gt;Cryptocurrency and IoT Security - How Smart Devices Can Be Hacked&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;mm9M&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Many lack strong security protections.&lt;/p&gt;
  &lt;p id=&quot;vwjz&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By tricking them into sending sensitive information.&lt;/p&gt;
  &lt;p id=&quot;3vzu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.On a hardware wallet.&lt;/p&gt;
  &lt;p id=&quot;BcDF&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Keep your crypto devices on a separate network from IoT devices.&lt;/p&gt;
  &lt;p id=&quot;pUnr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-uniswap-v4-hooks-and-their-security-implications?referralId=14986375521111316403&quot; target=&quot;_blank&quot;&gt;Understanding Uniswap V4 Hooks and Their Security Implications&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;mGWH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To allow custom logic to be added before and after liquidity events&lt;/p&gt;
  &lt;p id=&quot;R7Dq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Poorly implemented hooks can lead to permission mismatches and exploits&lt;/p&gt;
  &lt;p id=&quot;To56&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Implementing strict access control to prevent unauthorized function calls&lt;/p&gt;
  &lt;p id=&quot;TSq6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-hack3d-2024-part-3-building-a-resilient-web3-ecosystem?referralId=3976178091167743390&quot; target=&quot;_blank&quot;&gt;CertiK Hack3d 2024 Part 3 - Building a Resilient Web3 Ecosystem&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3nF2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Detect high-risk wallet authorizations&lt;/p&gt;
  &lt;p id=&quot;m7Yy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verifying URLs before interacting&lt;/p&gt;
  &lt;p id=&quot;GtFO&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-hack3d-2024-part-2-uncovering-major-incidents?referralId=2485509350204595256&quot; target=&quot;_blank&quot;&gt;CertiK Hack3d 2024 Part 2 - Uncovering Major Incidents&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;i3MM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Address poisoning&lt;/p&gt;
  &lt;p id=&quot;AqGd&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$129 Million Address Poisoning Case&lt;/p&gt;
  &lt;p id=&quot;iqpj&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.$243 million&lt;/p&gt;
  &lt;p id=&quot;BHfK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-hack3d-2024-part-1-web3-security-by-the-numbers?referralId=9432847502396997475&quot; target=&quot;_blank&quot;&gt;CertiK Hack3d 2024 Part 1 - Web3 Security by the Numbers&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Q1hc&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$2.3 billion&lt;/p&gt;
  &lt;p id=&quot;60lZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;Hfwg&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Ethereum&lt;/p&gt;
  &lt;p id=&quot;4Sft&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/blockchain-data-protection-and-privacy-compliance?referralId=1462449779120036693&quot; target=&quot;_blank&quot;&gt;Blockchain Data Protection and Privacy Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yhFq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It separates sensitive data into off-chain systems while keeping audit logs on-chain&lt;/p&gt;
  &lt;p id=&quot;DjoU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By verifying data validity without exposing underlying information&lt;/p&gt;
  &lt;p id=&quot;dlgV&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/quantum-computing-and-the-future-of-cryptocurrency-security&quot; target=&quot;_blank&quot;&gt;Quantum Computing and the Future of Cryptocurrency Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wWMH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.They use qubits that can represent multiple states at once&lt;/p&gt;
  &lt;p id=&quot;SihV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It ensures only valid users can sign transactions&lt;/p&gt;
  &lt;p id=&quot;ZaKo&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Current quantum computers lack the number of qubits required to break blockchain encryption&lt;/p&gt;
  &lt;p id=&quot;6EzW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/clipper-dex-withdrawal-vulnerability-exploit?referralId=14776858970815850259&quot; target=&quot;_blank&quot;&gt;Clipper DEX Withdrawal Vulnerability Exploit&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;TvGD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Vulnerability in the withdrawal function&lt;/p&gt;
  &lt;p id=&quot;kTrq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paused swaps and deposits, requiring mixed-asset withdrawals&lt;/p&gt;
  &lt;p id=&quot;ixg0&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;5q5F&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-polter-finance-exploit?referralId=899492545381069837&quot; target=&quot;_blank&quot;&gt;Understanding the Polter Finance Exploit&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Qsa2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Price oracle relying solely on spot prices.&lt;/p&gt;
  &lt;p id=&quot;jFQs&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By manipulating liquidity pairs via flashloans.&lt;/p&gt;
  &lt;p id=&quot;IhCj&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Validate oracle prices with historical data.&lt;/p&gt;
  &lt;p id=&quot;DDbs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/securing-solana-spl-contracts?referralId=2154351084000137090&quot; target=&quot;_blank&quot;&gt;Securing Solana SPL Contracts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1pdX&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Predefined accounts for program execution&lt;/p&gt;
  &lt;p id=&quot;J5GU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use CPIs with trusted programs only&lt;/p&gt;
  &lt;p id=&quot;KX1D&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cryptobottle-incident-analysis?referralId=9638197856382952640&quot; target=&quot;_blank&quot;&gt;CryptoBottle Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;TH2q&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.~$527,000&lt;/p&gt;
  &lt;p id=&quot;VPW7&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Disabled balance check&lt;/p&gt;
  &lt;p id=&quot;zcuL&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Invest()&lt;/p&gt;
  &lt;p id=&quot;tamA&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/enhancing-security-awareness-for-web3-desktop-wallets?referralId=7550919449159494369&quot; target=&quot;_blank&quot;&gt;Enhancing Security Awareness for Web3 Desktop Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ml7H&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.They are vulnerable to brute-force attacks&lt;/p&gt;
  &lt;p id=&quot;Oa4a&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It divides private keys across multiple participants, reducing single points of failure&lt;/p&gt;
  &lt;p id=&quot;1hyL&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/analyzing-security-for-solana-based-memecoins-with-certiks-token-scan-part-1?referralId=13682213622421088964&quot; target=&quot;_blank&quot;&gt;Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KFyn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It allows one party to manipulate price or withdraw liquidity easily&lt;/p&gt;
  &lt;p id=&quot;QGZb&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The team can alter the token’s attributes, which may be misleading&lt;/p&gt;
  &lt;p id=&quot;wwje&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.A generally low-risk token, though flagged issues should be reviewed&lt;/p&gt;
  &lt;p id=&quot;nhmX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/analyzing-security-for-solana-based-memecoins-with-certiks-token-scan-part-2?referralId=2257386787202337497&quot; target=&quot;_blank&quot;&gt;Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 2&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;t2jO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The team can mint additional tokens, potentially inflating supply&lt;/p&gt;
  &lt;p id=&quot;z4al&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It increases the risk of price manipulation by a few large holders&lt;/p&gt;
  &lt;p id=&quot;mWiz&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.DEXTools&lt;/p&gt;
  &lt;p id=&quot;YC7t&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/case-study-on-the-risks-of-phishing-attacks-in-defi?referralId=1051237503011721733&quot; target=&quot;_blank&quot;&gt;Case Study on the Risks of Phishing Attacks in DeFi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XXTz&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Ownership transfer of DSProxy&lt;/p&gt;
  &lt;p id=&quot;FCgG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Inferno Drainer&lt;/p&gt;
  &lt;p id=&quot;X1F6&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By transferring ownership of the DSProxy&lt;/p&gt;
  &lt;p id=&quot;jXxg&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security?referralId=7694637572386990685&quot; target=&quot;_blank&quot;&gt;Private Key Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;DRNI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If someone gains access to your private key, they gain access to your crypto assets&lt;/p&gt;
  &lt;p id=&quot;MYrJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Store it offline, preferably in a hardware wallet&lt;/p&gt;
  &lt;p id=&quot;Qlwr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/utopiasphere-incident-analysis?referralId=1437817724685870593&quot; target=&quot;_blank&quot;&gt;UtopiaSphere Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kxIy&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$521K&lt;/p&gt;
  &lt;p id=&quot;cXr3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.swapBurn()&lt;/p&gt;
  &lt;p id=&quot;KMxs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wazirx-hack-incident-analysis?referralId=4279478896426646772&quot; target=&quot;_blank&quot;&gt;WazirX Hack Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;TBFs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Compromised private key in a multisig wallet&lt;/p&gt;
  &lt;p id=&quot;Cdfr&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paused all trading and withdrawals&lt;/p&gt;
  &lt;p id=&quot;WTwe&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;10% of the total amount&lt;/p&gt;
  &lt;p id=&quot;Sdms&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/normie-incident-analysis?referralId=5775616935336737865&quot; target=&quot;_blank&quot;&gt;Normie Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wTiM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;. A Smart Contract Audit&lt;/p&gt;
  &lt;p id=&quot;LNp1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Allowing any address receiving a specific number of tokens to become a premarket_user&lt;/p&gt;
  &lt;p id=&quot;FIcS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hedgey-finance-event-analysis?referralId=12210450698186517410&quot; target=&quot;_blank&quot;&gt;Hedgey Finance Event Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Vblz&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;OHG7&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$2 million&lt;/p&gt;
  &lt;p id=&quot;zZmx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-popular-web3-messaging-apps?referralId=6168210370666611473&quot; target=&quot;_blank&quot;&gt;Evaluating Popular Web3 Messaging Apps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eklU&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Signal&lt;/p&gt;
  &lt;p id=&quot;lpst&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Telegram&lt;/p&gt;
  &lt;p id=&quot;7zEk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/navigating-dao-governance-and-the-compound-dao-incident?referralId=11636985650225362142&quot; target=&quot;_blank&quot;&gt;Navigating DAO Governance and the Compound DAO Incident&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wL9T&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The funds would be stored in a vault controlled by them&lt;/p&gt;
  &lt;p id=&quot;8BEg&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Limited Liability Corporation (LLC)&lt;/p&gt;
  &lt;p id=&quot;pEEZ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Implementing weekend-free voting and experimenting with AI proxy voting&lt;/p&gt;
  &lt;p id=&quot;LNWR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-the-security-model-for-optimisms-superchain?referralId=14373133239728815243&quot; target=&quot;_blank&quot;&gt;Exploring the Security Model for Optimism’s Superchain&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CkmB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A Layer 2 scaling solution for Ethereum&lt;/p&gt;
  &lt;p id=&quot;16jv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By posting transaction data to Ethereum&lt;/p&gt;
  &lt;p id=&quot;hMYc&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Fraud proofs&lt;/p&gt;
  &lt;p id=&quot;w3nx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-memecoin-markets-of-springfield?referralId=15058874098420615559&quot; target=&quot;_blank&quot;&gt;The Memecoin Markets of Springfield&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yO4i&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;iuOO&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;JPsT&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Chief Wiggum&lt;/p&gt;
  &lt;p id=&quot;1Wf6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/defending-against-clipper-malware?referralId=16769933747331166454&quot; target=&quot;_blank&quot;&gt;Defending Against Clipper Malware&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;x5wl&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Replaces copied crypto wallet addresses with hacker-controlled addresses&lt;/p&gt;
  &lt;p id=&quot;AlVj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Messaging apps like WhatsApp and Telegram&lt;/p&gt;
  &lt;p id=&quot;dbmz&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Verify wallet addresses before sending funds&lt;/p&gt;
  &lt;p id=&quot;SBJo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-crypto-market-manipulation?referralId=5065813419308085663&quot; target=&quot;_blank&quot;&gt;Identifying Crypto Market Manipulation&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;rVeb&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To create fake trading activity&lt;/p&gt;
  &lt;p id=&quot;9RSF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Tokens are artificially inflated and then sold off&lt;/p&gt;
  &lt;p id=&quot;O1zw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-top-incident-analyses?referralId=3341046178123889208&quot; target=&quot;_blank&quot;&gt;HACK3D Part 1: Top Incident Analyses&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;k27w&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Congestion&lt;/p&gt;
  &lt;p id=&quot;cW99&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The stolen assets were returned to the Munchables team&lt;/p&gt;
  &lt;p id=&quot;wPBT&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The CEO&amp;#x27;s resignation&lt;/p&gt;
  &lt;p id=&quot;ExH8&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-private-key-compromise?referralId=3790705653166222356&quot; target=&quot;_blank&quot;&gt;HACK3D Part 2: Private Key Compromise&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Qd2J&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$239 million&lt;/p&gt;
  &lt;p id=&quot;liDV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Chris Larsen&lt;/p&gt;
  &lt;p id=&quot;UiZF&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;75CI&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-rounding-issue-exploits?referralId=10066772472273759914&quot; target=&quot;_blank&quot;&gt;HACK3D Part 3: Rounding Issue Exploits&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;NyN1&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Newly-deployed lending pools&lt;/p&gt;
  &lt;p id=&quot;gxof&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Drainage of funds&lt;/p&gt;
  &lt;p id=&quot;IihZ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;pdV0&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/sonne-finance-incident-analysis?referralId=643214292471386427&quot; target=&quot;_blank&quot;&gt;Sonne Finance Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dU31&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;siWd&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$20 million&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;E3HV&quot; data-align=&quot;center&quot;&gt;Project Spotlights&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;862B&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mooncat-ai?referralId=10201714518994157817&quot; target=&quot;_blank&quot;&gt;MoonCat AI | AI-Governed DeFi with Zero-Fee Staking on UniChain&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uDi1&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It offers zero fees and dynamically adjusts APR based on AI-analyzed market conditions.&lt;/p&gt;
  &lt;p id=&quot;99VD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By undergoing CertiK security audits and obtaining a Team Verification badge&lt;/p&gt;
  &lt;p id=&quot;8Ytq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gnosis Safe multisig wallets with 48-hour timelock controllers and role-based access&lt;/p&gt;
  &lt;p id=&quot;aBvY&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Through AI-powered proposal analysis that rates security, economic impact, and alignment&lt;/p&gt;
  &lt;p id=&quot;jeO6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/qubic-world-record-fastest-blockchain-ever?referralId=13384480937390414354&quot; target=&quot;_blank&quot;&gt;Qubic | World Record Fastest Blockchain Ever&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KSgi&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.15.52 million TPS&lt;/p&gt;
  &lt;p id=&quot;4p2K&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Ticks&lt;/p&gt;
  &lt;p id=&quot;d4Qb&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.To support real-time decentralized AI/AGI&lt;/p&gt;
  &lt;p id=&quot;zt7T&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evedex-decentralized-trading-engine-on-layer3-infrastructure?referralId=13078396152876288696&quot; target=&quot;_blank&quot;&gt;EVEDEX | Decentralized Trading Engine on Layer-3 Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qAul&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.ERC-4337 Account Abstraction&lt;/p&gt;
  &lt;p id=&quot;3E92&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Social recovery wallets&lt;/p&gt;
  &lt;p id=&quot;1F1b&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Trading, referrals, and education&lt;/p&gt;
  &lt;p id=&quot;NzYV&quot;&gt;&lt;strong&gt;Quiz&lt;a href=&quot;https://skynet.certik.com/quest/chaingpt-ai-powered-solutions-for-blockchain-and-crypto?referralId=7100113397450648899&quot; target=&quot;_blank&quot;&gt;:ChainGPT | AI-Powered Solutions for Blockchain &amp;amp; Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tqP2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Governance &amp;amp; DAO&lt;/p&gt;
  &lt;p id=&quot;xhHm&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Smart Contract Generation &amp;amp; Auditing&lt;/p&gt;
  &lt;p id=&quot;SaGu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.AI-Powered News&lt;/p&gt;
  &lt;p id=&quot;RN5e&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/edu3labs-academy-pathway-to-web3-entrepreneurship?referralId=10576741632382282650&quot; target=&quot;_blank&quot;&gt;Edu3Labs Academy | Pathway to Web3 Entrepreneurship&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kGia&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Web3 Entrepreneurship&lt;/p&gt;
  &lt;p id=&quot;99bF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Token economy design and sustainable value models&lt;/p&gt;
  &lt;p id=&quot;K45G&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Exclusive content and mentorship&lt;/p&gt;
  &lt;p id=&quot;6Hfb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/bitdca-a-new-way-to-own-bitcoin?referralId=9924617275930811226&quot; target=&quot;_blank&quot;&gt;BitDCA | A New Way to Own Bitcoin&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WWPO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Passive BTCB rewards from transaction fees&lt;/p&gt;
  &lt;p id=&quot;0KeV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It automatically rounds up card purchases into BTC&lt;/p&gt;
  &lt;p id=&quot;5czJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/bonk-more-than-ordinary-dog?referralId=13906583278053575182&quot; target=&quot;_blank&quot;&gt;Bonk | More Than Ordinary (Dog)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ieTX&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.50%&lt;/p&gt;
  &lt;p id=&quot;WJqK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Multi-Chain, DeFi, Gaming&lt;/p&gt;
  &lt;p id=&quot;nolg&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.21%&lt;/p&gt;
  &lt;p id=&quot;ubfi&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/baby-neiro-the-next-gen-meme-token-revolution?referralId=7395055029664919417&quot; target=&quot;_blank&quot;&gt;Baby Neiro | The Next-Gen Meme Token Revolution&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Bnpv&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To unite the meme community and honor Doge’s influence&lt;/p&gt;
  &lt;p id=&quot;djLH&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.420,000,000,000,000,000&lt;/p&gt;
  &lt;p id=&quot;Wzzz&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By undergoing a CertiK security audit and obtaining a Team Verification badge&lt;/p&gt;
  &lt;p id=&quot;lCiT&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/portkey-wallet-a-secure-and-simplified-gateway-to-web3?referralId=11044410643060324558&quot; target=&quot;_blank&quot;&gt;Portkey Wallet | A secure and easy gateway to Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OvWq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Zero-Knowledge Proofs (ZKPs) through zkLogin&lt;/p&gt;
  &lt;p id=&quot;eWi7&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It uses manager addresses stored on user devices&lt;/p&gt;
  &lt;p id=&quot;fXqR&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.VA eliminates the need for individual contract deployment&lt;/p&gt;
  &lt;p id=&quot;YSw8&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/haven1-safehaven-evm-blockchain?referralId=3442885025377202085&quot; target=&quot;_blank&quot;&gt;Haven1 | Safehaven EVM Blockchain&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Oli7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.hPassport NFT&lt;/p&gt;
  &lt;p id=&quot;wnoE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Proof-of-Authority (PoA)&lt;/p&gt;
  &lt;p id=&quot;DS69&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.AI-powered incentive adjustments&lt;/p&gt;
  &lt;p id=&quot;OmvP&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ice-open-network-blueprint-for-a-new-internet?referralId=5232980515592548780&quot; target=&quot;_blank&quot;&gt;Ice Open Network | A Blueprint for a New Internet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kbye&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The team’s identities have been verified for transparency and trust&lt;/p&gt;
  &lt;p id=&quot;f6Oy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To onboard 5.5 billion internet users onto blockchain technology&lt;/p&gt;
  &lt;p id=&quot;hasZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/e-money-network-the-worlds-first-bankfi-network?referralId=12017608006721533955&quot; target=&quot;_blank&quot;&gt;E Money Network | The World&amp;#x27;s First BankFi Network&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;bSf7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The ability to spend crypto like cash at millions of locations&lt;/p&gt;
  &lt;p id=&quot;XT5K&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Regulatory adherence and trust&lt;/p&gt;
  &lt;p id=&quot;z8o2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Real-time FX conversion for seamless management&lt;/p&gt;
  &lt;p id=&quot;tW0B&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/spunkysdx-revolutionizing-commerce-with-blockchain-and-ai?referralId=12919523829909835062&quot; target=&quot;_blank&quot;&gt;SpunkySDX | Revolutionizing Commerce with Blockchain and AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cJz2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.AI algorithms&lt;/p&gt;
  &lt;p id=&quot;PICx&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.5%&lt;/p&gt;
  &lt;p id=&quot;uVv8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.KYC Badge&lt;/p&gt;
  &lt;p id=&quot;rezM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kendu-inu-organic-meme-community?referralId=12848165582748766639&quot; target=&quot;_blank&quot;&gt;Kendu Inu | Organic Meme Community&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;i06r&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Organic community-driven engagement&lt;/p&gt;
  &lt;p id=&quot;nAMA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Two major findings related to centralization were resolved&lt;/p&gt;
  &lt;p id=&quot;yFSK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/massa-the-first-decentralized-cloud-network?referralId=12454428785698488901&quot; target=&quot;_blank&quot;&gt;Massa | The First Decentralized Cloud Network&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lccE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It prevents smart contracts from operating autonomously&lt;/p&gt;
  &lt;p id=&quot;jifF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They operate independently based on predefined conditions&lt;/p&gt;
  &lt;p id=&quot;SKIw&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The transfer of ERC-20 tokens like USDC, DAI, and WETH between Ethereum and Massa&lt;/p&gt;
  &lt;p id=&quot;NOqN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/world-of-dypians-future-of-gaming-defi-nfts-and-ai?referralId=17070114411855603451&quot; target=&quot;_blank&quot;&gt;World of Dypians | Future of Gaming, DeFi, NFTs and AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IYtm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A combination of PvE, PvP, and blockchain-based features&lt;/p&gt;
  &lt;p id=&quot;QUHs&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By enabling exploration of diverse regions and discovery of hidden challenges&lt;/p&gt;
  &lt;p id=&quot;Y8NI&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They enable in-game activities such as character upgrades and event participation&lt;/p&gt;
  &lt;p id=&quot;OUWR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/tnq?referralId=381923304463027232&quot; target=&quot;_blank&quot;&gt;TNQ&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;m9m8&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.TNQ&lt;/p&gt;
  &lt;p id=&quot;pDK2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;uz45&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gold&lt;/p&gt;
  &lt;p id=&quot;WWWM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/goat-ai-bot-meme?referralId=2903632612118454562&quot; target=&quot;_blank&quot;&gt;GOAT | AI Bot Meme&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LQ5e&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Endorsement by an AI agent and a donation from Marc Andreessen&lt;/p&gt;
  &lt;p id=&quot;ATg6&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Bapz&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Andy Ayrey&lt;/p&gt;
  &lt;p id=&quot;340r&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pump-fun?referralId=13861842479555077209&quot; target=&quot;_blank&quot;&gt;Pump.Fun&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ykKg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It has a live streaming feature for promoting tokens&lt;/p&gt;
  &lt;p id=&quot;cxNC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;uI6n&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;iqSb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/okx-wallet-multi-chain-web3-wallet?referralId=2679109542082294377&quot; target=&quot;_blank&quot;&gt;OKX Wallet | Multi-Chain Web3 Wallet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gEX7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.DEX &amp;amp; Bridge Aggregator&lt;/p&gt;
  &lt;p id=&quot;YfME&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Overview of digital assets, portfolio performance, and transaction history&lt;/p&gt;
  &lt;p id=&quot;6Q19&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/opengpu-harnessing-decentralized-gpu-computing?referralId=13741414183512089008&quot; target=&quot;_blank&quot;&gt;OpenGPU | Harnessing Decentralized GPU Computing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dhRs&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Decentralized GPU computing&lt;/p&gt;
  &lt;p id=&quot;7uHy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.5000&lt;/p&gt;
  &lt;p id=&quot;M9A6&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;To test and innovate with advanced tools&lt;/p&gt;
  &lt;p id=&quot;36vq&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By joining the decentralized computing network&lt;/p&gt;
  &lt;p id=&quot;f9Es&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hanchain-transforming-music-copyright?referralId=3124977293317126668&quot; target=&quot;_blank&quot;&gt;HanChain | Transforming Music Copyright&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;sviJ&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;MusiKhan, NFT-PLAY, AdKhan, and staking options&lt;/p&gt;
  &lt;p id=&quot;Z9y8&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Top 10% security score, Certik&amp;#x27;s KYC verification, and ISO27001 certification&lt;/p&gt;
  &lt;p id=&quot;ZX49&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;Copyright protection and fair compensation through royalties&lt;/p&gt;
  &lt;p id=&quot;RxQ7&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/patex-the-latam-blockchain-ecosystem?referralId=15031244999995108287&quot; target=&quot;_blank&quot;&gt;Patex | Latin American Blockchain Ecosystems&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;j51h&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A comprehensive solution for the LATAM region&lt;/p&gt;
  &lt;p id=&quot;QQXE&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;To solve scalability issues, increase transaction speeds, and reduce fees&lt;/p&gt;
  &lt;p id=&quot;7Idu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It serves as the main currency for transactions&lt;/p&gt;
  &lt;p id=&quot;lZfw&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By identifying and fixing security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;90aT&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/polymarket-prediction-markets?referralId=2965004492508219695&quot; target=&quot;_blank&quot;&gt;Polymarket | Prediction Markets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uG45&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It operates without the need for intermediaries, using blockchain technology for decentralized control.&lt;/p&gt;
  &lt;p id=&quot;VH1e&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Prices fluctuate based on the collective trading activity and predictions of users.&lt;/p&gt;
  &lt;p id=&quot;FAms&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.A bug bounty program with rewards of up to $1,000,000 for identifying security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;yitW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/solidus-ai-tech-high-performance-computing?referralId=18112948996501595487&quot; target=&quot;_blank&quot;&gt;Solidus AI Tech | High-Performance Computing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;j7du&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;. Active bug bounty program, Team KYC verification, Security audit with automated formal verification;&lt;/p&gt;
  &lt;p id=&quot;voZm&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. High-performance computing power&lt;/p&gt;
  &lt;p id=&quot;Xded&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. Payment for AI and GPU services&lt;/p&gt;
  &lt;p id=&quot;ewqb&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;. 5&lt;/p&gt;
  &lt;p id=&quot;IGxp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/script-network-open-source-video-protocol?referralId=15110582946357075993&quot; target=&quot;_blank&quot;&gt;Script Network | Open Source Video Protocol&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;1.&lt;/strong&gt;A Layer 1 open-source live TV platform, protocol, and storage network&lt;br /&gt;&lt;strong&gt;2.&lt;/strong&gt;Governance and staking&lt;br /&gt;&lt;strong&gt;3&lt;/strong&gt;.By completing security assessments, maintaining an active KYC verification, and a bug bounty program&lt;br /&gt;&lt;strong&gt;4.&lt;/strong&gt;Watch multiple channels 24/7/365 and earn rewards&lt;/p&gt;
  &lt;p id=&quot;0QXm&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mint-club-building-your-bonding-curve?referralId=7745391982668529068&quot; target=&quot;_blank&quot;&gt;Mint Club | Building Your Bonding Curve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3SCC&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.ERC20 tokens and ERC1155 NFTs&lt;/p&gt;
  &lt;p id=&quot;cGte&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It lets creators easily set royalties from 0% to 50% on their assets.&lt;/p&gt;
  &lt;p id=&quot;bCUH&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It simplifies the airdrop process with Public and Private options.&lt;/p&gt;
  &lt;p id=&quot;56cn&quot;&gt;&lt;strong&gt;4.&lt;/strong&gt;It allows creators to distribute tokens or NFTs on over 12 networks.&lt;/p&gt;
  &lt;p id=&quot;yZS2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mintlayer-build-on-bitcoin?referralId=4936999137834924636&quot; target=&quot;_blank&quot;&gt;Mintlayer | Build on Bitcoin&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qh4h&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To improve direct token interoperability with Bitcoin&lt;/p&gt;
  &lt;p id=&quot;GcXU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By providing a built-in DEX for P2P transfers&lt;/p&gt;
  &lt;p id=&quot;yh7U&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Both fungible and non-fungible tokens&lt;/p&gt;
  &lt;p id=&quot;n1mh&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;. enable users to participate in the block signer auction and earn rewards&lt;/p&gt;
  &lt;p id=&quot;rueB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/paw-chain-ecosystem?referralId=2224306640283722749&quot; target=&quot;_blank&quot;&gt;PAW Chain | Ecosystem&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;EUQl&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.3&lt;/p&gt;
  &lt;p id=&quot;w0LP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2&lt;/p&gt;
  &lt;p id=&quot;FIlD&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.4&lt;/p&gt;
  &lt;p id=&quot;lAQM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wexo-global-payment-infrastructure?referralId=2334550911270168402&quot; target=&quot;_blank&quot;&gt;WEXO | Global Payment Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;M2Hp&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Allows conversion between digital and fiat currencies within the wallet&lt;/p&gt;
  &lt;p id=&quot;oLTu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Bitcoin Lightning POS&lt;/p&gt;
  &lt;p id=&quot;onDq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By allowing access to premium features and reduced transaction fees within the platform&lt;/p&gt;
  &lt;p id=&quot;e2Oz&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Regular security audits linked to on-chain verified smart contracts&lt;/p&gt;
  &lt;p id=&quot;SDdz&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ton?referralId=15885095932325318202&quot; target=&quot;_blank&quot;&gt;TON | Layer 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;rxrV&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Ensures consistency and security across the network&lt;/p&gt;
  &lt;p id=&quot;FASp&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Over 100,000 TPS&lt;/p&gt;
  &lt;p id=&quot;2o25&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/arbitrum-layer-2?referralId=2769198078991306554&quot; target=&quot;_blank&quot;&gt;Arbitrum | Layer 2&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;DARM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Offchain Labs&lt;/p&gt;
  &lt;p id=&quot;IM02&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Yes - $2,000,000&lt;/p&gt;
  &lt;p id=&quot;OKrH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/core-dao-infrastructure?referralId=17279057383833825566&quot; target=&quot;_blank&quot;&gt;Core DAO | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;59Qo&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;sYGq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Satoshi Plus consensus mechanism&lt;/p&gt;
  &lt;p id=&quot;LcgQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/edu3labs-the-future-of-education?referralId=16883100990799124666&quot; target=&quot;_blank&quot;&gt;Edu3Labs | The Future of Education&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;F6d4&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.AI, Education, Blockchain;&lt;/p&gt;
  &lt;p id=&quot;AWBJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Gold&lt;/p&gt;
  &lt;p id=&quot;pE58&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gate.io, MEXC&lt;/p&gt;
  &lt;p id=&quot;qyZJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/aptos?referralId=14743960922308816577&quot; target=&quot;_blank&quot;&gt;Aptos | Layer 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YHo6&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;A developer-friendly environment, focusing on scalability and security&lt;/p&gt;
  &lt;p id=&quot;fTM4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;kWOQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pepe?referralId=13779578226808512813&quot; target=&quot;_blank&quot;&gt;PEPE | Meme&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qGGt&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Undergoing a CertiK audit of its token contract&lt;/p&gt;
  &lt;p id=&quot;QEUQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The top 10 holders own less than 5% of the total supply.&lt;/p&gt;
  &lt;p id=&quot;gplO&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ondo-finance?referralId=6150060403471369825&quot; target=&quot;_blank&quot;&gt;Ondo Finance | RWA&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IoQR&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;7qIC&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Conducts compliance checks and engages with regulatory bodies&lt;/p&gt;
  &lt;p id=&quot;mp0C&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/diamante-blockchain-infrastructure?referralId=9924102790695002822&quot; target=&quot;_blank&quot;&gt;Diamante Blockchain | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ULqy&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.No Medium, Major, or Critical issues&lt;/p&gt;
  &lt;p id=&quot;0rsa&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The team has been comprehensively verified, demonstrating high transparency&lt;/p&gt;
  &lt;p id=&quot;aZXC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.PayCircle and CreditCircle&lt;/p&gt;
  &lt;p id=&quot;A9A9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/zkswap-finance?referralId=8655475631583067283&quot; target=&quot;_blank&quot;&gt;zkSwap Finance | DeFi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IeBp&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Swap to Earn&lt;/p&gt;
  &lt;p id=&quot;XDkV&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt; 6&lt;/p&gt;
  &lt;p id=&quot;gUuU&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt; False - The team has been KYC verified by CertiK&lt;/p&gt;
  &lt;p id=&quot;LMW9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ripple-xrp-ledger?referralId=3126039791665756896&quot; target=&quot;_blank&quot;&gt;Ripple (XRP Ledger) | Layer 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ny85&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The security of its Automated Market Maker (AMM) implementation&lt;/p&gt;
  &lt;p id=&quot;yBnn&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Highly active and engaged&lt;/p&gt;
  &lt;p id=&quot;PWT3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ethena?referralId=11651827827178316112&quot; target=&quot;_blank&quot;&gt;Ethena | Stablecoin&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;aYRx&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Delta hedging&lt;/p&gt;
  &lt;p id=&quot;inR1&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Internet Bond&lt;/p&gt;
  &lt;p id=&quot;G8aQ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/eigenlayer?referralId=2150556762092745992&quot; target=&quot;_blank&quot;&gt;EigenLayer | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lOCK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Shared security model leveraging staked ETH&lt;/p&gt;
  &lt;p id=&quot;w2yK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To provide a safety net in case of protocol failures or hacks&lt;/p&gt;
  &lt;p id=&quot;doCy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wormhole?referralId=3031551934819834370&quot; target=&quot;_blank&quot;&gt;Wormhole | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3Wsh&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;P1ZQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$5M&lt;/p&gt;
  &lt;p id=&quot;s9kh&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/phantom-wallet-solana-and-web3-wallet?referralId=10992396914883809058&quot; target=&quot;_blank&quot;&gt;Phantom Wallet | Solana and Web3 Wallet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;xumg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Ability to store and manage Solana tokens and NFTs&lt;/p&gt;
  &lt;p id=&quot;UDS3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;LV7w&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Up to $50,000 in rewards for reporting security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;HXmS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/worldcoin-or-store-of-value?referralId=8909989351846476171&quot; target=&quot;_blank&quot;&gt;Worldcoin | Store of Value&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Sq3U&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;Lm1O&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Operators could bypass verification without proper ID.&lt;/p&gt;
  &lt;p id=&quot;GFTG&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/friendtech?referralId=12655297629852102447&quot; target=&quot;_blank&quot;&gt;FriendTech | Social&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wwX8&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;fGfT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Rewards of up to 1,000,000 USDC based on bug severity&lt;/p&gt;
  &lt;p id=&quot;BBz3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/metamask-overview?referralId=5143181676712375008&quot; target=&quot;_blank&quot;&gt;MetaMask Overview&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ijvk&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Serving as an Ethereum wallet and gateway to DApps.&lt;/p&gt;
  &lt;p id=&quot;l1YF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By providing a Secret Recovery Phrase for wallet recovery.&lt;/p&gt;
  &lt;p id=&quot;GyCS&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Connecting to unverified or suspicious DApps.&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;Iway&quot; data-align=&quot;center&quot;&gt;Skynet Platform&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;6EXs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-to-ace-the-certik-kyc-badge?referralId=12539497058912913638&quot; target=&quot;_blank&quot;&gt;How to Ace the CertiK KYC Badge&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ykQN&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The project team is transparent and verified.&lt;/p&gt;
  &lt;p id=&quot;dT5I&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Using fake IDs or hiding key team members.&lt;/p&gt;
  &lt;p id=&quot;czca&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It builds trust and enhances transparency.&lt;/p&gt;
  &lt;p id=&quot;q3Cl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/analyzing-security-for-solana-based-memecoins-with-certiks-token-scan-part-1?referralId=13682213622421088964&quot; target=&quot;_blank&quot;&gt;Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Yw83&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It allows one party to manipulate price or withdraw liquidity easily&lt;/p&gt;
  &lt;p id=&quot;8ZhZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The team can alter the token’s attributes, which may be misleading&lt;/p&gt;
  &lt;p id=&quot;buWi&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.A generally low-risk token, though flagged issues should be reviewed&lt;/p&gt;
  &lt;p id=&quot;POvY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/analyzing-security-for-solana-based-memecoins-with-certiks-token-scan-part-2?referralId=2257386787202337497&quot; target=&quot;_blank&quot;&gt;Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 2&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ARw7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The team can mint additional tokens, potentially inflating supply&lt;/p&gt;
  &lt;p id=&quot;XHpD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It increases the risk of price manipulation by a few large holders&lt;/p&gt;
  &lt;p id=&quot;xLtQ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.DEXTools&lt;/p&gt;
  &lt;p id=&quot;tw7v&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/welcome-to-skynet-quest?referralId=17505435184835396358&quot; target=&quot;_blank&quot;&gt;Welcome to Skynet Quest&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cAOD&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/set-up-your-skynet-username?referralId=15583134230545644474&quot; target=&quot;_blank&quot;&gt;Set up Your Skynet Username&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gPpx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/link-your-socials-x?referralId=9513637780272814796&quot; target=&quot;_blank&quot;&gt;Link Your Socials - X&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;csgl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/connecting-your-telegram-with-skynet?referralId=6192479647155137552&quot; target=&quot;_blank&quot;&gt;Connecting Your Telegram with Skynet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;QIo2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/connecting-discord-with-skynet?referralId=9195561156260961382&quot; target=&quot;_blank&quot;&gt;Connecting Discord with Skynet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;7h8Y&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/web3-security-with-skynet?referralId=772035781796166985&quot; target=&quot;_blank&quot;&gt;Web3 Security with Skynet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CMQB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Security Scores&lt;/p&gt;
  &lt;p id=&quot;4xsK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;cGYs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-certik-does-kyc?referralId=3191862940480632527&quot; target=&quot;_blank&quot;&gt;How CertiK Does KYC&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LnHM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;2sx7&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Video Call, ID Check, Review &amp;amp; Award&lt;/p&gt;
  &lt;p id=&quot;bgzC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;QFsu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-tools-for-tracking-top-crypto-wallets?referralId=545797772777247317&quot; target=&quot;_blank&quot;&gt;Best Tools for Tracking Top Crypto Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XlzE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Dune Analytics&lt;/p&gt;
  &lt;p id=&quot;DOFB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;jHy6&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Monitoring crypto market trends&lt;/p&gt;
  &lt;p id=&quot;kDwy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/prioritize-wallet-security-with-skynet-wallet-scanning?referralId=8166383652438326560&quot; target=&quot;_blank&quot;&gt;Prioritize Wallet Security with Skynet Wallet Scanning&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;aeCT&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To identify high-risk approvals and potential threats&lt;/p&gt;
  &lt;p id=&quot;FpOQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Risky approvals and value at risk&lt;/p&gt;
  &lt;p id=&quot;JxU1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-security-with-skynet-token-scan?referralId=6889895534988717988&quot; target=&quot;_blank&quot;&gt;Evaluating Security with Skynet Token Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Yote&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Smart contract code&lt;/p&gt;
  &lt;p id=&quot;gfCC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;0iBq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Severity level&lt;/p&gt;
  &lt;p id=&quot;0Jit&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/stay-ahead-with-skynets-smart-calendar?referralId=7622454342774928004&quot; target=&quot;_blank&quot;&gt;Stay Ahead with Skynet&amp;#x27;s Smart Calendar&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;A8dQ&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Airdrops&lt;/p&gt;
  &lt;p id=&quot;1hV5&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;It tracks important Web3 events such as token unlocking and exchange listings&lt;/p&gt;
  &lt;p id=&quot;7AiY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/website-and-dapp-security?referralId=13278999103800562405&quot; target=&quot;_blank&quot;&gt;Website &amp;amp; dApp Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;7eho&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;B4zd&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;The dApp has limited documentation and transparency&lt;/p&gt;
  &lt;p id=&quot;NGp4&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/choosing-a-secure-exchange?referralId=15146377076458402765&quot; target=&quot;_blank&quot;&gt;Choosing a Secure Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;EHBj&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;All of the above&lt;/p&gt;
  &lt;p id=&quot;LVp1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ouJS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-wallet-security?referralId=16403428101071015288&quot; target=&quot;_blank&quot;&gt;Introduction to Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lNEX&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If the custodial service experiences a security breach, hack, or service itself becomes inaccessible, you may lose access to your private keys.&lt;/p&gt;
  &lt;p id=&quot;aW3I&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Storing them in a hardware wallet or encrypted offline location&lt;/p&gt;
  &lt;p id=&quot;zR3u&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/team-and-insider-risks?referralId=7800496360587123548&quot; target=&quot;_blank&quot;&gt;Team and Insider Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iXWg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Lack of accountability and transparency&lt;/p&gt;
  &lt;p id=&quot;KCDY&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;T1eE&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security?referralId=4683719194833802030&quot; target=&quot;_blank&quot;&gt;Operational Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;B37b&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;eZEE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They harness community expertise to identify bugs&lt;/p&gt;
  &lt;p id=&quot;y6lR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-risk-signals-on-the-exchange?referralId=15228800082055343187&quot; target=&quot;_blank&quot;&gt;Recognizing Risk Signals on the Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gcl3&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;They might be recommending a scam or fraudulent scheme&lt;/p&gt;
  &lt;p id=&quot;0eam&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The exchange has liquidity problems or internal issues&lt;/p&gt;
  &lt;p id=&quot;55nM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/important-exchange-security-features?referralId=16293381021708240115&quot; target=&quot;_blank&quot;&gt;Important Exchange Security Features&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Wgge&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The exchange has strong information security management systems&lt;/p&gt;
  &lt;p id=&quot;zFzk&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It minimizes the risks associated with using a cryptocurrency exchange&lt;/p&gt;
  &lt;p id=&quot;GO7i&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-reserve?referralId=5543442415609451864&quot; target=&quot;_blank&quot;&gt;Proof of Reserve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;BFiP&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Tqdd&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;LmAS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/community-and-security-risks-in-web3?referralId=10551768520323127760&quot; target=&quot;_blank&quot;&gt;Community and Security Risks in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;s497&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Influences market stability and trust&lt;/p&gt;
  &lt;p id=&quot;OPqD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;U6fp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/market-related-risks?referralId=4859741538501270514&quot; target=&quot;_blank&quot;&gt;Market-Related Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Njes&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It increases the risk of market manipulation&lt;/p&gt;
  &lt;p id=&quot;Al86&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It indicates strong interest and potential liquidity.&lt;/p&gt;
  &lt;p id=&quot;Jl0T&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-and-security-in-daos?referralId=10450324854265183332&quot; target=&quot;_blank&quot;&gt;Governance and Security in DAOs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;4DMU&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Centralization risks in smart contract&lt;/p&gt;
  &lt;p id=&quot;9glv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;3Oax&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/code-security?referralId=17965297244896798201&quot; target=&quot;_blank&quot;&gt;Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;RBiJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and fix potential security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;IBAW&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;KF5R&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-score-impacts-with-okx?referralId=130214319943394590&quot; target=&quot;_blank&quot;&gt;Security Score Impacts with OKX&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6uSs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To increase security awareness&lt;/p&gt;
  &lt;p id=&quot;RF29&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Overall security score and subcategory scores&lt;/p&gt;
  &lt;p id=&quot;gJuT&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skynet-pulse-real-time-insights-by-security-experts?referralId=14801632575970093052&quot; target=&quot;_blank&quot;&gt;Skynet Pulse - Real-Time Insights by Security Experts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ptq6&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt; By clicking on the heart icon at the top of the Skynet homepage&lt;/p&gt;
  &lt;p id=&quot;tIOK&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;The project’s security score and a link to their Skynet profile&lt;/p&gt;
  &lt;p id=&quot;OlDT&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-formal-verification?referralId=13411599581235529462&quot; target=&quot;_blank&quot;&gt;Introduction to Formal Verification&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;7dXn&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;pzJV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Defining properties of contracts to be verified&lt;/p&gt;
  &lt;p id=&quot;6euk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-malicious-activity-on-websites-and-dapps?referralId=14391326312041387297&quot; target=&quot;_blank&quot;&gt;Identifying Malicious Activity on Websites &amp;amp; dApps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;m0a4&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking&lt;/p&gt;
  &lt;p id=&quot;Lts1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The URL has subtle differences from the legitimate site, like extra characters or misspellings&lt;/p&gt;
  &lt;p id=&quot;SL1B&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/losses-related-to-private-key-compromises?referralId=3379987647332406542&quot; target=&quot;_blank&quot;&gt;Losses Related to Private Key Compromises&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;nqgI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Nearly $881 million across 47 incidents&lt;/p&gt;
  &lt;p id=&quot;XXAK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Binance&lt;/p&gt;
  &lt;p id=&quot;DTkd&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-practices-for-wallet-security?referralId=17172386887916103779&quot; target=&quot;_blank&quot;&gt;Best Practices for Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;u9LY&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;q52o&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The recipient’s wallet address to ensure it’s correct&lt;/p&gt;
  &lt;p id=&quot;W5Y1&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-user-security&quot; target=&quot;_blank&quot;&gt;Introduction to User Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vJZN&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds&lt;/p&gt;
  &lt;p id=&quot;t8d3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2&lt;/p&gt;
  &lt;p id=&quot;THUn&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/empowering-your-web3-journey-with-advanced-security-tools?referralId=17249634678944098774&quot; target=&quot;_blank&quot;&gt;Empowering Your Web3 Journey with Advanced Security Tools&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tpyt&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Security Score&lt;/p&gt;
  &lt;p id=&quot;gL7S&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Wallet Scan&lt;/p&gt;
  &lt;p id=&quot;GRNU&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Real-time updates and trends from various sources&lt;/p&gt;
  &lt;p id=&quot;EcoF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kyc-leaderboard-showcase?referralId=12215367053965547520&quot; target=&quot;_blank&quot;&gt;KYC Leaderboard Showcase&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WlLa&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Verified identities of key team members.&lt;/p&gt;
  &lt;p id=&quot;EedF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Full verification with low risk and high transparency&lt;/p&gt;
  &lt;p id=&quot;KC4k&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/rwa-security-and-leaderboard?referralId=10571810790173092755&quot; target=&quot;_blank&quot;&gt;RWA Security and Leaderboard&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;STYW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Conducting regular smart contract audits&lt;/p&gt;
  &lt;p id=&quot;yw8l&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;TH1I&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-rating-for-pre-launch-projects?referralId=14542761996400421215&quot; target=&quot;_blank&quot;&gt;Security Rating for Pre-Launch Projects&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1OoP&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Market Stability&lt;/p&gt;
  &lt;p id=&quot;yNr5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stage 2&lt;/p&gt;
  &lt;p id=&quot;g9IE&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;ML0H&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-token-holder-analysis?referralId=11249118686618612056&quot; target=&quot;_blank&quot;&gt;Insights on Token Holder Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OTI2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;yLW9&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Total Value Locked (TVL)&lt;/p&gt;
  &lt;p id=&quot;U11T&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.High percentage on project owner holding&lt;/p&gt;
  &lt;p id=&quot;nbAe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-activity-monitoring?referralId=10841772136631773812&quot; target=&quot;_blank&quot;&gt;Governance Activity Monitoring&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;AMYZ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It reflects the level of governance activity in comparison to other Web3 projects by aggregating various signals&lt;/p&gt;
  &lt;p id=&quot;1uHf&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;afr0&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Project&amp;#x27;s financial performance&lt;/p&gt;
  &lt;p id=&quot;3uI5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/github-monitoring-for-better-code-security?referralId=2947965897230806152&quot; target=&quot;_blank&quot;&gt;GitHub Monitoring for Better Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dK2A&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;YqAD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Qdbk&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False - Introducing new code may also introduce bugs and vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;1i6N&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security-via-website-scan?referralId=16558688121911411307&quot; target=&quot;_blank&quot;&gt;Operational Security via Website Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;MGrr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Security; DNS Health; Application Security/&lt;/p&gt;
  &lt;p id=&quot;bA4M&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;yHy2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Penetration Testing&lt;/p&gt;
  &lt;p id=&quot;uXZ1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-market-analytics?referralId=5200565301090517712&quot; target=&quot;_blank&quot;&gt;Insights on Market Analytics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XMhL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fully diluted market cap&lt;/p&gt;
  &lt;p id=&quot;zlsf&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt; 1,2,3&lt;/p&gt;
  &lt;p id=&quot;nt2e&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;MMCL&quot; data-align=&quot;center&quot;&gt;CertiK Highlights&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;ExWM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-skynode-blockchains-secure-foundation?referralId=14099429135122267237&quot; target=&quot;_blank&quot;&gt;Understanding SkyNode: Blockchain’s Secure Foundation&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;khVA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It secures and optimizes blockchain nodes.&lt;/p&gt;
  &lt;p id=&quot;MMsm&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Tracks staking rewards and validator metrics.&lt;/p&gt;
  &lt;p id=&quot;dSfJ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;WD3A&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-to-ace-the-certik-kyc-badge?referralId=12539497058912913638&quot; target=&quot;_blank&quot;&gt;How to Ace the CertiK KYC Badge&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ObXp&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The project team is transparent and verified.&lt;/p&gt;
  &lt;p id=&quot;2nHu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Using fake IDs or hiding key team members.&lt;/p&gt;
  &lt;p id=&quot;CP7J&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It builds trust and enhances transparency.&lt;/p&gt;
  &lt;p id=&quot;ieKG&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/analyzing-security-for-solana-based-memecoins-with-certiks-token-scan-part-1?referralId=13682213622421088964&quot; target=&quot;_blank&quot;&gt;Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;0PFY&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It allows one party to manipulate price or withdraw liquidity easily&lt;/p&gt;
  &lt;p id=&quot;yiQF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The team can alter the token’s attributes, which may be misleading&lt;/p&gt;
  &lt;p id=&quot;QM1a&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.A generally low-risk token, though flagged issues should be reviewed&lt;/p&gt;
  &lt;p id=&quot;eb0c&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/analyzing-security-for-solana-based-memecoins-with-certiks-token-scan-part-2?referralId=2257386787202337497&quot; target=&quot;_blank&quot;&gt;Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 2&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iPUK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The team can mint additional tokens, potentially inflating supply&lt;/p&gt;
  &lt;p id=&quot;xvdJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It increases the risk of price manipulation by a few large holders&lt;/p&gt;
  &lt;p id=&quot;gnvj&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.DEXTools&lt;/p&gt;
  &lt;p id=&quot;ROIM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-certik-does-kyc?referralId=3191862940480632527&quot; target=&quot;_blank&quot;&gt;How CertiK Does KYC&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qLZu&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;r4zt&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Video Call, ID Check, Review &amp;amp; Award&lt;/p&gt;
  &lt;p id=&quot;I2mx&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;mCV1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-ventures?referralId=16722289876220779271&quot; target=&quot;_blank&quot;&gt;CertiK Ventures&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VAlX&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Shiba Inu&lt;/p&gt;
  &lt;p id=&quot;dtU9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Foster the growth of security-first projects&lt;/p&gt;
  &lt;p id=&quot;wyHL&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-ventures-announcement-in-singapore?referralId=2577260006463565989&quot; target=&quot;_blank&quot;&gt;CertiK Ventures Announcement in Singapore&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2s2r&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$45 Million&lt;/p&gt;
  &lt;p id=&quot;pws6&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Token Scan; Wallet Scan&lt;/p&gt;
  &lt;p id=&quot;1BMW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.$360 Billion&lt;/p&gt;
  &lt;p id=&quot;iwSe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/okx-and-certik-fast-pass-program?referralId=15462949631044153544&quot; target=&quot;_blank&quot;&gt;OKX and CertiK Fast Pass Program&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JOWG&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Providing rigorous security audits for projects&lt;/p&gt;
  &lt;p id=&quot;gV6A&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By receiving regular updates and detailed security reports&lt;/p&gt;
  &lt;p id=&quot;8Tb3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/apple-recognizes-certik?referralId=9635407603831279980&quot; target=&quot;_blank&quot;&gt;Apple Recognizes CertiK&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Pkhr&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt; 5&lt;/p&gt;
  &lt;p id=&quot;r3oB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Identify the structure of kernel memory&lt;/p&gt;
  &lt;p id=&quot;sCSl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Improving buffer overflow protection&lt;/p&gt;
  &lt;p id=&quot;ylpF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skyinsights-crypto-compliance?referralId=1950400298119381327&quot; target=&quot;_blank&quot;&gt;SkyInsights: Crypto Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;sGSO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and analyze suspicious activities in cryptocurrency transactions&lt;/p&gt;
  &lt;p id=&quot;LD6y&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.FinCEN&lt;/p&gt;
  &lt;p id=&quot;e3O9&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Entity Labeling &amp;amp; Categorization; Asset Movement Tracing and Logging; Customizable Case Management &amp;amp; Audit Trails.&lt;/p&gt;
  &lt;p id=&quot;HhQt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certiks-journey-to-samsungs-security-hall-of-fame?referralId=2311989611534668750&quot; target=&quot;_blank&quot;&gt;CertiK&amp;#x27;s Journey to Samsung&amp;#x27;s Security Hall of Fame&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;50EG&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Secured a top five place in Samsung&amp;#x27;s Mobile Security Hall of Fame&lt;/p&gt;
  &lt;p id=&quot;jJrj&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Seven&lt;/p&gt;
  &lt;p id=&quot;9esw&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Critical and high severity vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;F26S&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-score-impacts-with-okx?referralId=130214319943394590&quot; target=&quot;_blank&quot;&gt;Security Score Impacts with OKX&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KdNE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To increase security awareness&lt;/p&gt;
  &lt;p id=&quot;IdfS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Overall security score and subcategory scores&lt;/p&gt;
  &lt;p id=&quot;fsun&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/certik-uncovers-vulnerability-in-apple-vision-pro?referralId=18204126597715039781&quot; target=&quot;_blank&quot;&gt;CertiK Uncovers Vulnerability in Apple Vision Pro&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LyU0&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.GAZEploit&lt;/p&gt;
  &lt;p id=&quot;ko06&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.92%&lt;/p&gt;
  &lt;p id=&quot;oMwV&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Six times&lt;/p&gt;
  &lt;p id=&quot;kkii&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/interview-with-professor-ronghui-gu-who-monitors-the-monitors?referralId=2714353996158414390&quot; target=&quot;_blank&quot;&gt;Interview with Professor Ronghui Gu: &amp;quot;Who Monitors the Monitors?&amp;quot;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Jucv&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.50%&lt;/p&gt;
  &lt;p id=&quot;HNjE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By making them public on the Skynet platform&lt;/p&gt;
  &lt;p id=&quot;BTXQ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Decentralizing authentication and data storage&lt;/p&gt;
  &lt;p id=&quot;PHki&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-report-q2-h1-2024-overview-and-key-highlights?referralId=1771266537997594336&quot; target=&quot;_blank&quot;&gt;Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;r0Vw&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;4jqG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$1.19 billion&lt;/p&gt;
  &lt;p id=&quot;TNgv&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-report-q2-h1-2024-insights-and-future-security-enhancements?referralId=15990728660013628100&quot; target=&quot;_blank&quot;&gt;Hack3d Report Q2 H1 2024 - Part 2: Insights and Future Security Enhancements&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;P88K&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The need for user education and enhanced verification processes&lt;/p&gt;
  &lt;p id=&quot;5oFT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Meticulously verifying wallet addresses before transactions&lt;/p&gt;
  &lt;p id=&quot;Fbae&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-top-incident-analyses?referralId=3341046178123889208&quot; target=&quot;_blank&quot;&gt;HACK3D Part 1: Top Incident Analyses&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;9eCe&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Congestion&lt;/p&gt;
  &lt;p id=&quot;ECKm&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The stolen assets were returned to the Munchables team&lt;/p&gt;
  &lt;p id=&quot;6jMp&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The CEO&amp;#x27;s resignation&lt;/p&gt;
  &lt;p id=&quot;5o2h&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-private-key-compromise?referralId=3790705653166222356&quot; target=&quot;_blank&quot;&gt;HACK3D Part 2: Private Key Compromise&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;571Z&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$239 million&lt;/p&gt;
  &lt;p id=&quot;dHar&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Chris Larsen&lt;/p&gt;
  &lt;p id=&quot;39Ff&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;zKFc&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-rounding-issue-exploits?referralId=10066772472273759914&quot; target=&quot;_blank&quot;&gt;HACK3D Part 3: Rounding Issue Exploits&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;4PB0&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Newly-deployed lending pools&lt;/p&gt;
  &lt;p id=&quot;iwPQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Drainage of funds&lt;/p&gt;
  &lt;p id=&quot;jHfd&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;IEIb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-part-1-most-common-attack-in-q3-2024?referralId=1134170039223354539&quot; target=&quot;_blank&quot;&gt;Hack3d Part 1: Most Common Attack Vectors in Q3 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JB8w&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;svy5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-check URLs and email addresses for legitimacy&lt;/p&gt;
  &lt;p id=&quot;UOGZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-part-2-major-hacks-of-q3-2024?referralId=6920465006978566901&quot; target=&quot;_blank&quot;&gt;Hack3d Part 2: Major Hacks of Q3 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;v1dv&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$238 million&lt;/p&gt;
  &lt;p id=&quot;E1dv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Private key theft&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h1 id=&quot;IGF0&quot; data-align=&quot;center&quot;&gt;Web3 Fundamentals&lt;/h1&gt;
  &lt;/section&gt;
  &lt;p id=&quot;9yPV&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-psbt-in-bitcoin-defi-ecosystem?referralId=8690288343691269797&quot; target=&quot;_blank&quot;&gt;Exploring PSBT in Bitcoin DeFi Ecosystem&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ooSk&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Creation, sharing, and signing of transactions&lt;/p&gt;
  &lt;p id=&quot;g4le&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.SIGHASH_ALL&lt;/p&gt;
  &lt;p id=&quot;89Le&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;KpdC&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/fundraising-in-the-web3-industry?referralId=14942687597294804994&quot; target=&quot;_blank&quot;&gt;Fundraising in the Web3 Industry&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Z4ch&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To distribute tokens in exchange for capital&lt;/p&gt;
  &lt;p id=&quot;TaVq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They allow community members to vote on fund allocation.&lt;/p&gt;
  &lt;p id=&quot;MiMC&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Rh85&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/unlocking-ethereum-etfs-with-blackrocks-etha?referralId=16738242300718908113&quot; target=&quot;_blank&quot;&gt;Unlocking Ethereum ETFs With BlackRock’s ETHA&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;btcC&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Ether tokens&lt;/p&gt;
  &lt;p id=&quot;cyE3&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.BlackRock&lt;/p&gt;
  &lt;p id=&quot;FSRI&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;aEg4&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/stablecoin-risks-identifying-and-mitigating-vulnerabilities?referralId=3142282990200599980&quot; target=&quot;_blank&quot;&gt;Stablecoin Risks: Identifying and Mitigating Vulnerabilities&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FBLt&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Dependency on centralized custodians&lt;/p&gt;
  &lt;p id=&quot;sfCS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.A failure in its algorithmic stabilization system&lt;/p&gt;
  &lt;p id=&quot;ivcP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Diversify across multiple stablecoins with transparent audits&lt;/p&gt;
  &lt;p id=&quot;keDU&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/securing-solana-spl-contracts?referralId=2154351084000137090&quot; target=&quot;_blank&quot;&gt;Securing Solana SPL Contracts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VpRz&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Predefined accounts for program execution&lt;/p&gt;
  &lt;p id=&quot;fLyU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use CPIs with trusted programs only&lt;/p&gt;
  &lt;p id=&quot;bIKu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-power-of-hashing?referralId=11691409534964869073&quot; target=&quot;_blank&quot;&gt;The Power of Hashing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;W5nX&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;jGpP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Secured Password Storage;  File Integrity Verification&lt;/p&gt;
  &lt;p id=&quot;eLfD&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-memecoin-liquidity?referralId=17634771874409326707&quot; target=&quot;_blank&quot;&gt;Evaluating Memecoin Liquidity&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iBjL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Reduces price volatility&lt;/p&gt;
  &lt;p id=&quot;1j77&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.24-hour trading volume&lt;/p&gt;
  &lt;p id=&quot;tzfM&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;oCt9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-stablecoin-reserves?referralId=14866479171887007686&quot; target=&quot;_blank&quot;&gt;Understanding Stablecoin Reserves&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VRll&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fiat currency reserves&lt;/p&gt;
  &lt;p id=&quot;n7w9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To hedge against the volatility of crypto assets&lt;/p&gt;
  &lt;p id=&quot;ZjAO&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;VuBd&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/multi-signature-wallets-explained?referralId=3690371426101021028&quot; target=&quot;_blank&quot;&gt;Multi-Signature Wallets Explained &lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;05vn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To require multiple approvals for transactions&lt;/p&gt;
  &lt;p id=&quot;SIcC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.3&lt;/p&gt;
  &lt;p id=&quot;Nikc&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;ffEV&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pump-fun?referralId=13861842479555077209&quot; target=&quot;_blank&quot;&gt;Pump.Fun&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;nKBH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It has a live streaming feature for promoting tokens&lt;/p&gt;
  &lt;p id=&quot;0dhW&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;UTbx&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;rWwJ&quot;&gt;Quiz:Understanding Stablecoin Reserves&lt;/p&gt;
  &lt;p id=&quot;ZwNt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-certik-does-kyc?referralId=3191862940480632527&quot; target=&quot;_blank&quot;&gt;How CertiK Does KYC&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gB8T&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;Imrl&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Video Call, ID Check, Review &amp;amp; Award&lt;/p&gt;
  &lt;p id=&quot;QC5b&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;F6WM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-tools-for-tracking-top-crypto-wallets?referralId=545797772777247317&quot; target=&quot;_blank&quot;&gt;Best Tools for Tracking Top Crypto Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;F4A2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Dune Analytics&lt;/p&gt;
  &lt;p id=&quot;JtNr&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;IhOt&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Monitoring crypto market trends&lt;/p&gt;
  &lt;p id=&quot;g5ww&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/website-and-dapp-security?referralId=13278999103800562405&quot; target=&quot;_blank&quot;&gt;Website &amp;amp; dApp Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uHd2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;e6v4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The dApp has limited documentation and transparency&lt;/p&gt;
  &lt;p id=&quot;jJSN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/choosing-a-secure-exchange?referralId=15146377076458402765&quot; target=&quot;_blank&quot;&gt;Choosing a Secure Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VflA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;xOse&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;vNw1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-wallet-security?referralId=16403428101071015288&quot; target=&quot;_blank&quot;&gt;Introduction to Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;V6Wb&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If the custodial service experiences a security breach, hack, or service itself becomes inaccessible, you may lose access to your private keys.&lt;/p&gt;
  &lt;p id=&quot;VZkW&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Storing them in a hardware wallet or encrypted offline location&lt;/p&gt;
  &lt;p id=&quot;vaAE&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-security-with-skynet-token-scan?referralId=6889895534988717988&quot; target=&quot;_blank&quot;&gt;Evaluating Security with Skynet Token Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lqm7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Smart contract code&lt;/p&gt;
  &lt;p id=&quot;EJzF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;jhZ8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Severity level&lt;/p&gt;
  &lt;p id=&quot;buFu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/team-and-insider-risks?referralId=7800496360587123548&quot; target=&quot;_blank&quot;&gt;Team and Insider Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kyNa&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Lack of accountability and transparency&lt;/p&gt;
  &lt;p id=&quot;I29x&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;lQga&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security?referralId=4683719194833802030&quot; target=&quot;_blank&quot;&gt;Operational Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;GDjG&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;G1Js&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They harness community expertise to identify bugs&lt;/p&gt;
  &lt;p id=&quot;xXUm&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/web3-security-with-skynet?referralId=772035781796166985&quot; target=&quot;_blank&quot;&gt;Web3 Security with Skynet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ntDQ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Security Scores&lt;/p&gt;
  &lt;p id=&quot;KR7w&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;NwN6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-the-misuse-of-certiks-brand?referralId=8907532782619814531&quot; target=&quot;_blank&quot;&gt;Recognizing the Misuse of CertiK&amp;#x27;s Brand&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6HGp&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Verify their credentials using CertiK’s Employee Verification tool&lt;/p&gt;
  &lt;p id=&quot;ChGI&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;9xvN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security?referralId=7694637572386990685&quot; target=&quot;_blank&quot;&gt;Private Key Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;HEFy&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If someone gains access to your private key, they gain access to your crypto assets&lt;/p&gt;
  &lt;p id=&quot;5dCZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Store it offline, preferably in a hardware wallet&lt;/p&gt;
  &lt;p id=&quot;PhF2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security-seed-phrases?referralId=17178613058994527673&quot; target=&quot;_blank&quot;&gt;Private Key Security: Seed Phrases&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Fawd&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Create a backup and store it in secure locations&lt;/p&gt;
  &lt;p id=&quot;laDj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It can be hacked or accessed by unauthorized parties&lt;/p&gt;
  &lt;p id=&quot;9DKu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-risk-signals-on-the-exchange?referralId=15228800082055343187&quot; target=&quot;_blank&quot;&gt;Recognizing Risk Signals on the Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;38ul&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.They might be recommending a scam or fraudulent scheme&lt;/p&gt;
  &lt;p id=&quot;IYoD&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The exchange has liquidity problems or internal issues&lt;/p&gt;
  &lt;p id=&quot;chHg&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/important-exchange-security-features?referralId=16293381021708240115&quot; target=&quot;_blank&quot;&gt;Important Exchange Security Features&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;EhyI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The exchange has strong information security management systems&lt;/p&gt;
  &lt;p id=&quot;IQK5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It minimizes the risks associated with using a cryptocurrency exchange&lt;/p&gt;
  &lt;p id=&quot;mu4U&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-reserve?referralId=5543442415609451864&quot; target=&quot;_blank&quot;&gt;Proof of Reserve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JmoZ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;WZST&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;R1FF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/community-and-security-risks-in-web3?referralId=10551768520323127760&quot; target=&quot;_blank&quot;&gt;Community and Security Risks in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WCto&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Influences market stability and trust&lt;/p&gt;
  &lt;p id=&quot;aLiy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;jPde&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/market-related-risks?referralId=4859741538501270514&quot; target=&quot;_blank&quot;&gt;Market-Related Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;X9qm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It increases the risk of market manipulation&lt;/p&gt;
  &lt;p id=&quot;OE7v&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It indicates strong interest and potential liquidity.&lt;/p&gt;
  &lt;p id=&quot;Z3bP&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-and-security-in-daos?referralId=10450324854265183332&quot; target=&quot;_blank&quot;&gt;Governance and Security in DAOs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KKl2&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Centralization risks in smart contract&lt;/p&gt;
  &lt;p id=&quot;FRYh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;rrL2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/code-security?referralId=17965297244896798201&quot; target=&quot;_blank&quot;&gt;Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ER5B&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and fix potential security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;wX5Y&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;OHqa&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/different-mechanisms-for-honeypot-scams?referralId=13131013968688026695&quot; target=&quot;_blank&quot;&gt;Different Mechanisms for Honeypot Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;jPzA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.An all-green chart with no sells&lt;/p&gt;
  &lt;p id=&quot;jvfJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;QZvq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-yourself-from-discord-scams?referralId=1042445682667554029&quot; target=&quot;_blank&quot;&gt;Protecting Yourself from Discord Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;D1Vk&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Posting fake offers for free mints or airdrops to exploit FOMO (Fear Of Missing Out)&lt;/p&gt;
  &lt;p id=&quot;evSX&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Reset your password as soon as possible and ensure 2FA is enabled&lt;/p&gt;
  &lt;p id=&quot;JeTs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-crypto-drainers?referralId=637350153324198711&quot; target=&quot;_blank&quot;&gt;Intro to Crypto Drainers&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LypY&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;0B2Y&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;qLJe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-and-avoiding-phishing-scams-in-x-replies?referralId=3468589033596343733&quot; target=&quot;_blank&quot;&gt;Identifying and Avoiding Phishing Scams in X Replies&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;th87&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Display names on X can be misused to impersonate official accounts, Scammers may disguise themselves using Gold Check accounts on X;&lt;/p&gt;
  &lt;p id=&quot;Bfv5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Same display name as the official account, A very similar username, Same account profile picture;&lt;/p&gt;
  &lt;p id=&quot;30DQ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Users could always trust messages prior to the End of Thread&lt;/p&gt;
  &lt;p id=&quot;vt2N&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-peel-chain-technique?referralId=6092805390136895237&quot; target=&quot;_blank&quot;&gt;Understanding the Peel Chain Technique&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wGYv&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A laundering technique dividing a large amount into small transactions&lt;/p&gt;
  &lt;p id=&quot;lMgq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To hide funds through a series of small transactions&lt;/p&gt;
  &lt;p id=&quot;rqTD&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-formal-verification?referralId=13411599581235529462&quot; target=&quot;_blank&quot;&gt;Introduction to Formal Verification&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;NXM6&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;M18e&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Defining properties of contracts to be verified&lt;/p&gt;
  &lt;p id=&quot;uWHB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-malicious-activity-on-websites-and-dapps?referralId=14391326312041387297&quot; target=&quot;_blank&quot;&gt;Identifying Malicious Activity on Websites &amp;amp; dApps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vfe9&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking&lt;/p&gt;
  &lt;p id=&quot;7Tcb&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The URL has subtle differences from the legitimate site, like extra characters or misspellings&lt;/p&gt;
  &lt;p id=&quot;W7mU&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/losses-related-to-private-key-compromises?referralId=3379987647332406542&quot; target=&quot;_blank&quot;&gt;Losses Related to Private Key Compromises&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;QNen&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Nearly $881 million across 47 incidents&lt;/p&gt;
  &lt;p id=&quot;rSds&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Binance&lt;/p&gt;
  &lt;p id=&quot;u3sK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-practices-for-wallet-security?referralId=17172386887916103779&quot; target=&quot;_blank&quot;&gt;Best Practices for Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;EMff&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;pwRB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The recipient’s wallet address to ensure it’s correct&lt;/p&gt;
  &lt;p id=&quot;9Vcm&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-user-security&quot; target=&quot;_blank&quot;&gt;Introduction to User Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lCW6&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds&lt;/p&gt;
  &lt;p id=&quot;gC8h&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2&lt;/p&gt;
  &lt;p id=&quot;RJtw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-of-diamond-agency-contract?referralId=3170796198508340067&quot; target=&quot;_blank&quot;&gt;Introduction of Diamond Agency Contract&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;020N&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ZDJb&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To prevent unauthorized access to privileged roles&lt;/p&gt;
  &lt;p id=&quot;OaTW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/top-compliance-risks-in-crypto?referralId=16399802578092275294&quot; target=&quot;_blank&quot;&gt;Top Compliance Risks in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;96aF&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Exposure to illicit activities&lt;/p&gt;
  &lt;p id=&quot;Eqct&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;59Kn&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By maintaining a repository of global regulations&lt;/p&gt;
  &lt;p id=&quot;YRXe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-to-create-and-maintain-secure-passwords?referralId=13058038752038047591&quot; target=&quot;_blank&quot;&gt;How to Create and Maintain Secure Passwords&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WQaX&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To prevent hackers from accessing multiple accounts&lt;/p&gt;
  &lt;p id=&quot;wCbj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.A mix of upper and lower case letters, numbers, and special characters&lt;/p&gt;
  &lt;p id=&quot;ohI8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Regularly to prevent expired passwords from being useful to hackers&lt;/p&gt;
  &lt;p id=&quot;RXHx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-and-preventing-sybil-attacks?referralId=15658778574720314134&quot; target=&quot;_blank&quot;&gt;Understanding and Preventing Sybil Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;t9lQ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.An attack where one person creates multiple identities to take over a network.&lt;/p&gt;
  &lt;p id=&quot;EKMT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above.&lt;/p&gt;
  &lt;p id=&quot;RThI&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By making it impractical and costly for attackers to succeed.&lt;/p&gt;
  &lt;p id=&quot;1NXe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/what-is-a-keylogger?referralId=8707739076659356886&quot; target=&quot;_blank&quot;&gt;What Is a Keylogger?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gN9d&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Regularly check USB ports for unfamiliar devices&lt;/p&gt;
  &lt;p id=&quot;rkXu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stealing sensitive information&lt;/p&gt;
  &lt;p id=&quot;ggav&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-cryptocurrency-news-sources?referralId=16644553435179039608&quot; target=&quot;_blank&quot;&gt;Evaluating Cryptocurrency News Sources&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;zkYn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;kKWR&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3,4&lt;/p&gt;
  &lt;p id=&quot;LQb9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/stay-vigilant-on-browser-plugins?referralId=17950452728626331804&quot; target=&quot;_blank&quot;&gt;Stay Vigilant on Browser Plugins&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;V7dM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Using plugins promoted by users on social platforms&lt;/p&gt;
  &lt;p id=&quot;AQFt&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;SBbV&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-work-versus-proof-of-stake?referralId=17559957049395425841&quot; target=&quot;_blank&quot;&gt;Proof of Work versus Proof of Stake&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;8DHC&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Proof of Work&lt;/p&gt;
  &lt;p id=&quot;zLFP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It saves massive amounts of energy&lt;/p&gt;
  &lt;p id=&quot;rZwF&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It has a high bar of entry, making it hard for attackers to manipulate&lt;/p&gt;
  &lt;p id=&quot;28NJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/empowering-your-web3-journey-with-advanced-security-tools?referralId=17249634678944098774&quot; target=&quot;_blank&quot;&gt;Empowering Your Web3 Journey with Advanced Security Tools&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VNCa&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Security Score&lt;/p&gt;
  &lt;p id=&quot;v8gX&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Wallet Scan&lt;/p&gt;
  &lt;p id=&quot;vssx&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Real-time updates and trends from various sources&lt;/p&gt;
  &lt;p id=&quot;q1MG&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kyc-leaderboard-showcase?referralId=12215367053965547520&quot; target=&quot;_blank&quot;&gt;KYC Leaderboard Showcase&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;8kdb&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Verified identities of key team members.&lt;/p&gt;
  &lt;p id=&quot;fHTK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Full verification with low risk and high transparency&lt;/p&gt;
  &lt;p id=&quot;Nsa3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-account-abstraction?referralId=15860065917261768287&quot; target=&quot;_blank&quot;&gt;Introduction to Account Abstraction&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3V3v&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Allowing for transactions to be conducted fully anonymously&lt;/p&gt;
  &lt;p id=&quot;e8rT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;ylNr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-the-dhs-is-stopping-ransomware-attacks?referralId=15603437711319365322&quot; target=&quot;_blank&quot;&gt;How the DHS is Stopping Ransomware Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;V3o4&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A type of malware that locks data and demands payment to unlock it.&lt;/p&gt;
  &lt;p id=&quot;zApI&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.537&lt;/p&gt;
  &lt;p id=&quot;87Cl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gathering evidence to prosecute hackers.&lt;/p&gt;
  &lt;p id=&quot;ll5T&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-chain-hopping-and-crypto-money-laundering?referralId=6371277034313326130&quot; target=&quot;_blank&quot;&gt;Understanding Chain Hopping and Crypto Money Laundering&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tIUE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By pooling and redistributing cryptocurrencies among multiple users&lt;/p&gt;
  &lt;p id=&quot;Lhjb&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;2yfR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-etherscan?referralId=8842130191011626299&quot; target=&quot;_blank&quot;&gt;Exploring Etherscan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;pXr8&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A search engine for Ethereum&amp;#x27;s blockchain data&lt;/p&gt;
  &lt;p id=&quot;yjvL&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Transaction history, token balances, and NFTs&lt;/p&gt;
  &lt;p id=&quot;L6m8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;e3Qg&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-aml-and-its-role-in-crypto?referralId=15738321562498690349&quot; target=&quot;_blank&quot;&gt;Intro to AML and its Role in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uV7t&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Placement&lt;/p&gt;
  &lt;p id=&quot;KGQO&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To verify users&amp;#x27; identities&lt;/p&gt;
  &lt;p id=&quot;LYd5&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It’s hard to trace transactions&lt;/p&gt;
  &lt;p id=&quot;8yOs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/secure-use-of-exchanges?referralId=6815740301666868655&quot; target=&quot;_blank&quot;&gt;Secure Use of Exchanges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WDsn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Two-Factor Authentication (2FA)&lt;/p&gt;
  &lt;p id=&quot;0Yxh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It stores your cryptocurrency offline, providing better security&lt;/p&gt;
  &lt;p id=&quot;3nZW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Receiving an unsolicited email with a link to reset your password&lt;/p&gt;
  &lt;p id=&quot;yHyy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-the-rise-of-ai-memecoins?referralId=1645591723833842933&quot; target=&quot;_blank&quot;&gt;Exploring the Rise of AI Memecoins&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ucua&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Increased retail trading and viral hype&lt;/p&gt;
  &lt;p id=&quot;KHCc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;GDX7&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Memecoins are launched with all supply unlocked&lt;/p&gt;
  &lt;p id=&quot;nlP8&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-us-crypto-tax-forms?referralId=14917579774669395944&quot; target=&quot;_blank&quot;&gt;Understanding U.S. Crypto Tax Forms&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;MjmR&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Form 8949&lt;/p&gt;
  &lt;p id=&quot;MFBC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;ELGM&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The duration the asset was held&lt;/p&gt;
  &lt;p id=&quot;MWnw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/what-is-depin?referralId=15100470899667488769&quot; target=&quot;_blank&quot;&gt;What is DePIN?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;5Mjx&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Decentralized Physical Infrastructure Network&lt;/p&gt;
  &lt;p id=&quot;cQ9m&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Filecoin&lt;/p&gt;
  &lt;p id=&quot;KNDR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/dextools-real-time-trading-insights?referralId=4029549202211727132&quot; target=&quot;_blank&quot;&gt;DEXTools | Real-Time Trading Insights&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wx4S&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To provide real-time analytics and insights for decentralized exchanges&lt;/p&gt;
  &lt;p id=&quot;yzRE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Trending 24-Hour Charts&lt;/p&gt;
  &lt;p id=&quot;bmEn&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Reduced fees, access to premium features, and participation in governance&lt;/p&gt;
  &lt;p id=&quot;GZfo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/case-study-on-enhancing-security-for-app-chains?referralId=14561032952850902786&quot; target=&quot;_blank&quot;&gt;Case Study on Enhancing Security for App Chains&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;5B7O&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All subsequent transactions failed while nodes appeared operational&lt;/p&gt;
  &lt;p id=&quot;wPvY&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Limiting the total number of functions within a contract&lt;/p&gt;
  &lt;p id=&quot;9HnX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/soc-2-compliance-for-crypto-companies?referralId=8490561579313297340&quot; target=&quot;_blank&quot;&gt;SOC 2 Compliance for Crypto Companies&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WF0i&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;Mdut&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Security, Availability, Processing Integrity, Confidentiality, and Privacy&lt;/p&gt;
  &lt;p id=&quot;qIuk&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It helps demonstrate a commitment to data security and builds trust with users&lt;/p&gt;
  &lt;p id=&quot;XmPe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-and-mitigating-51-attacks?referralId=18013243720688296512&quot; target=&quot;_blank&quot;&gt;Understanding and Mitigating 51% Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;oJzT&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.An attacker gains control of more than half of the network’s computational power&lt;/p&gt;
  &lt;p id=&quot;NJ6k&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-spending of coins&lt;/p&gt;
  &lt;p id=&quot;wSwX&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By distributing mining power widely and adjusting mining difficulty&lt;/p&gt;
  &lt;p id=&quot;AVBw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-history-overview?referralId=3255928297795011014&quot; target=&quot;_blank&quot;&gt;Proof of History Overview&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yYql&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A cryptographic time-keeping mechanism&lt;/p&gt;
  &lt;p id=&quot;M36H&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.SHA-256&lt;/p&gt;
  &lt;p id=&quot;HIZ9&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By reducing the time needed for transaction ordering&lt;/p&gt;
  &lt;p id=&quot;dvRU&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.To achieve high throughput and scalability&lt;/p&gt;
  &lt;p id=&quot;R0lE&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/setting-up-a-security-war-room?referralId=17867478544302965192&quot; target=&quot;_blank&quot;&gt;Setting Up a Security War Room&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OKwF&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Secure messaging apps&lt;/p&gt;
  &lt;p id=&quot;ZWkg&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They identify weaknesses and improve team coordination&lt;/p&gt;
  &lt;p id=&quot;0uKw&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;obCB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/sim-swap-attacks?referralId=16139425250616761896&quot; target=&quot;_blank&quot;&gt;SIM Swap Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;hKgc&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Searching the dark web to find your previously leaked information; Browsing through your public social media accounts.&lt;/p&gt;
  &lt;p id=&quot;Lg2J&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use authentication apps like Okta or Authy.&lt;/p&gt;
  &lt;p id=&quot;gB4A&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/common-web3-phishing-methods?referralId=6867287355170951518&quot; target=&quot;_blank&quot;&gt;Common Web3 Phishing Methods&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;0Diy&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;QfS5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;WVTI&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-against-social-engineering-attacks?referralId=17123893867364986672&quot; target=&quot;_blank&quot;&gt;Protecting Against Social Engineering Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qLN4&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Tricks aimed at specific individuals to steal sensitive information.&lt;/p&gt;
  &lt;p id=&quot;YhGZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.An email with urgent requests for confidential information.&lt;/p&gt;
  &lt;p id=&quot;uNnI&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Verify the request using a trusted method.&lt;/p&gt;
  &lt;p id=&quot;Ca32&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/navigating-nft-security-and-avoiding-scams?referralId=3907516863440339025&quot; target=&quot;_blank&quot;&gt;Navigating NFT Security and Avoiding Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CTEJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By checking the creator&amp;#x27;s profile and NFT metadata.&lt;/p&gt;
  &lt;p id=&quot;kWLP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.In a hardware wallet that supports NFTs.&lt;/p&gt;
  &lt;p id=&quot;8b0o&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Enabling two-factor authentication on accounts.&lt;/p&gt;
  &lt;p id=&quot;xU8A&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/rwa-security-and-leaderboard?referralId=10571810790173092755&quot; target=&quot;_blank&quot;&gt;RWA Security and Leaderboard&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1MT1&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Conducting regular smart contract audits&lt;/p&gt;
  &lt;p id=&quot;tvSx&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;GA7o&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-rating-for-pre-launch-projects?referralId=14542761996400421215&quot; target=&quot;_blank&quot;&gt;Security Rating for Pre-Launch Projects&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;pXnn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Market Stability&lt;/p&gt;
  &lt;p id=&quot;qblA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stage 2&lt;/p&gt;
  &lt;p id=&quot;nNrV&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;JJx8&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-token-holder-analysis?referralId=11249118686618612056&quot; target=&quot;_blank&quot;&gt;Insights on Token Holder Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YafA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;R8eV&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Total Value Locked (TVL)&lt;/p&gt;
  &lt;p id=&quot;ycfU&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.High percentage on project owner holding&lt;/p&gt;
  &lt;p id=&quot;uU9T&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-activity-monitoring?referralId=10841772136631773812&quot; target=&quot;_blank&quot;&gt;Governance Activity Monitoring&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iL6N&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It reflects the level of governance activity in comparison to other Web3 projects by aggregating various signals&lt;/p&gt;
  &lt;p id=&quot;P7ow&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;2fe2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Project&amp;#x27;s financial performance&lt;/p&gt;
  &lt;p id=&quot;nRwg&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/github-monitoring-for-better-code-security?referralId=2947965897230806152&quot; target=&quot;_blank&quot;&gt;GitHub Monitoring for Better Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;c6j3&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;Q2t4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;gZAR&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False - Introducing new code may also introduce bugs and vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;PNqt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security-via-website-scan?referralId=16558688121911411307&quot; target=&quot;_blank&quot;&gt;Operational Security via Website Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;m1bo&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Security; DNS Health; Application Security/&lt;/p&gt;
  &lt;p id=&quot;iqet&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;TeUe&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Penetration Testing&lt;/p&gt;
  &lt;p id=&quot;LoRF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-market-analytics?referralId=5200565301090517712&quot; target=&quot;_blank&quot;&gt;Insights on Market Analytics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;igL1&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fully diluted market cap&lt;/p&gt;
  &lt;p id=&quot;Tpz2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;ZNas&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;z4nI&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-economic-exploits-and-tokenomics?referralId=2877488948817488841&quot; target=&quot;_blank&quot;&gt;Understanding Economic Exploits and Tokenomics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;izHs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Manipulating financial mechanisms for profit&lt;/p&gt;
  &lt;p id=&quot;R1yN&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It influences decentralization and market stability&lt;/p&gt;
  &lt;p id=&quot;ZTY4&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They prevent token supply from being immediately flooded&lt;/p&gt;
  &lt;p id=&quot;SJrm&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-your-postgresql-database-from-cryptojacking?referralId=7883181834866710561&quot; target=&quot;_blank&quot;&gt;Protecting Your PostgreSQL Database from Cryptojacking&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;jlw1&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;1O8E&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Creates a new user account with high privileges&lt;/p&gt;
  &lt;p id=&quot;wECJ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Using strong, unique passwords and regular system updates&lt;/p&gt;
  &lt;p id=&quot;j3E3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-soft-rug-vs-hard-rug-pulls?referralId=9963276234478114641&quot; target=&quot;_blank&quot;&gt;Understanding Soft Rug vs. Hard Rug Pulls&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XB2Y&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Developers abandoning and removing liquidity, leaving investors with worthless tokens&lt;/p&gt;
  &lt;p id=&quot;v57d&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Gradual selling of tokens by the development team&lt;/p&gt;
  &lt;p id=&quot;oHdH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hackers-infiltrating-crypto-job-boards?referralId=6430472449098112400&quot; target=&quot;_blank&quot;&gt;Hackers Infiltrating Crypto Job Boards&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;9Jtq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$600 million&lt;/p&gt;
  &lt;p id=&quot;DxTv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.4,000&lt;/p&gt;
  &lt;p id=&quot;Vtu8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Refusing to turn on the camera&lt;/p&gt;
  &lt;p id=&quot;G8si&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/importance-of-bug-bounty-programs-in-web3?referralId=13278395323435539940&quot; target=&quot;_blank&quot;&gt;Importance of Bug Bounty Programs in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;exGf&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;87vc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use open source expertise for security&lt;/p&gt;
  &lt;p id=&quot;m9gf&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. 1,2,3,4&lt;/p&gt;
  &lt;p id=&quot;gPxl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-airdrop-scams?referralId=12461496521175762681&quot; target=&quot;_blank&quot;&gt;Intro to Airdrop Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2ptq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False - projects never ask for such information.&lt;/p&gt;
  &lt;p id=&quot;VWYq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;ihnd&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cold-wallets?referralId=14163199852116713909&quot; target=&quot;_blank&quot;&gt;Cold Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;xeix&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Storing your crypto assets offline for safe and long-term storage&lt;/p&gt;
  &lt;p id=&quot;wukp&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paper Wallet, Hardware Wallet, Offline Software Wallet&lt;/p&gt;
  &lt;p id=&quot;3adQ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Always purchase a wallet directly from the manufacturer, Check on hardware wallet&amp;#x27;s security features&lt;/p&gt;
  &lt;p id=&quot;TbJl&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;Xy7e&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;8ek4&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(236, 74%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;pGzI&quot;&gt;&lt;strong&gt;P.S. Ваше мнение важно! Если вам понравилась статья или у вас есть комментарии, не стесняйтесь оставлять реакцию ниже. &lt;a href=&quot;https://t.me/retroflowx&quot; target=&quot;_blank&quot;&gt;Telegram&lt;/a&gt;&lt;/strong&gt;&lt;/h2&gt;
  &lt;/section&gt;

</content></entry><entry><id>retroflowx:RetroDropBTC</id><link rel="alternate" type="text/html" href="https://teletype.in/@retroflowx/RetroDropBTC?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=retroflowx"></link><title> Certik Skynet Quest Answers</title><published>2024-07-05T15:12:57.135Z</published><updated>2025-02-03T10:50:38.365Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img4.teletype.in/files/32/96/329624cd-34ac-4597-8fca-3b14b7b1e395.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img2.teletype.in/files/d9/60/d960fcee-da8b-45a2-8c9b-613c3e6752de.jpeg&quot;&gt;Certik is a cross-network protocol for blockchain security. The project has raised $141 million from funds such as Binance, Coinbase, Sequoia and others.</summary><content type="html">
  &lt;figure id=&quot;5CZH&quot; class=&quot;m_column&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/d9/60/d960fcee-da8b-45a2-8c9b-613c3e6752de.jpeg&quot; width=&quot;1280&quot; /&gt;
  &lt;/figure&gt;
  &lt;section style=&quot;background-color:hsl(hsl(0,   0%,  var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h2 id=&quot;6OP4&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;Ответы обновлены в новой статье - &lt;a href=&quot;https://teletype.in/@retroflowx/9g7_BPBjajJ&quot; target=&quot;_blank&quot;&gt;здесь&lt;/a&gt;&lt;br /&gt;Answers updated in new article - &lt;a href=&quot;https://teletype.in/@retroflowx/9g7_BPBjajJ&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/h2&gt;
    &lt;h2 id=&quot;d30d&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;Ответы обновлены в новой статье - &lt;a href=&quot;https://teletype.in/@retroflowx/9g7_BPBjajJ&quot; target=&quot;_blank&quot;&gt;здесь&lt;/a&gt;&lt;br /&gt;Answers updated in new article - &lt;a href=&quot;https://teletype.in/@retroflowx/9g7_BPBjajJ&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/h2&gt;
    &lt;h2 id=&quot;awvP&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;Ответы обновлены в новой статье - &lt;a href=&quot;https://teletype.in/@retroflowx/9g7_BPBjajJ&quot; target=&quot;_blank&quot;&gt;здесь&lt;/a&gt;&lt;br /&gt;Answers updated in new article - &lt;a href=&quot;https://teletype.in/@retroflowx/9g7_BPBjajJ&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/h2&gt;
  &lt;/section&gt;
  &lt;p id=&quot;TxHz&quot;&gt;To perform:&lt;/p&gt;
  &lt;p id=&quot;z6VF&quot;&gt;1. Go to the Certik Skynet website;&lt;/p&gt;
  &lt;p id=&quot;xU7Z&quot;&gt;2. Pass registration;&lt;/p&gt;
  &lt;p id=&quot;Hmbd&quot;&gt;3.On the tab “Quest” perform tasks, for which we get Gems and XP;&lt;/p&gt;
  &lt;p id=&quot;zdj6&quot;&gt;4.Every day perform daily tasks in the Daily Tasks tab.&lt;/p&gt;
  &lt;p id=&quot;RBYv&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;GFbw&quot;&gt;&lt;strong&gt;Subscribe to our channel: &lt;a href=&quot;https://t.me/retroflowx&quot; target=&quot;_blank&quot;&gt;Telegram&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1Pq6&quot;&gt;&lt;/p&gt;
  &lt;h2 id=&quot;LGKr&quot;&gt;&lt;strong&gt;Answers updated 01.11.24&lt;/strong&gt;&lt;/h2&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h3 id=&quot;eFgb&quot; data-align=&quot;center&quot;&gt;SKYNET RATING&lt;/h3&gt;
  &lt;/section&gt;
  &lt;p id=&quot;EHE4&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-ventures-announcement-in-singapore?referralId=2577260006463565989&quot; target=&quot;_blank&quot;&gt;CertiK Ventures Announcement in Singapore&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wuCd&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$45 Million&lt;/p&gt;
  &lt;p id=&quot;LEs2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Token Scan; Wallet Scan&lt;/p&gt;
  &lt;p id=&quot;DKdm&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.$360 Billion&lt;/p&gt;
  &lt;p id=&quot;Q1m3&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/empowering-your-web3-journey-with-advanced-security-tools?referralId=17249634678944098774&quot; target=&quot;_blank&quot;&gt;Empowering Your Web3 Journey with Advanced Security Tools&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kNXN&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Security Score&lt;/p&gt;
  &lt;p id=&quot;MNb5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Wallet Scan&lt;/p&gt;
  &lt;p id=&quot;6vce&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Real-time updates and trends from various sources&lt;/p&gt;
  &lt;p id=&quot;vr7E&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/prioritize-wallet-security-with-skynet-wallet-scanning?referralId=8166383652438326560&quot; target=&quot;_blank&quot;&gt;Prioritize Wallet Security with Skynet Wallet Scanning&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XTha&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To identify high-risk approvals and potential threats&lt;/p&gt;
  &lt;p id=&quot;WYUk&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Risky approvals and value at risk&lt;/p&gt;
  &lt;p id=&quot;H3ds&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kyc-leaderboard-showcase?referralId=12215367053965547520&quot; target=&quot;_blank&quot;&gt;KYC Leaderboard Showcase&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IPrT&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Verified identities of key team members.&lt;/p&gt;
  &lt;p id=&quot;GNiX&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Full verification with low risk and high transparency&lt;/p&gt;
  &lt;p id=&quot;a4sO&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/stay-ahead-with-skynets-smart-calendar?referralId=7622454342774928004&quot; target=&quot;_blank&quot;&gt;Stay Ahead with Skynet&amp;#x27;s Smart Calendar&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ppZ3&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Airdrops&lt;/p&gt;
  &lt;p id=&quot;Tbbj&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;It tracks important Web3 events such as token unlocking and exchange listings&lt;strong&gt;&lt;br /&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-security-with-skynet-token-scan?referralId=6889895534988717988&quot; target=&quot;_blank&quot;&gt;Evaluating Security with Skynet Token Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;t1ui&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Smart contract code&lt;/p&gt;
  &lt;p id=&quot;hfkg&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;LFU5&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Severity level&lt;/p&gt;
  &lt;p id=&quot;B984&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/apple-recognizes-certik?referralId=9635407603831279980&quot; target=&quot;_blank&quot;&gt;Apple Recognizes CertiK&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;headlessui-listbox-option-:r1i:&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt; 5&lt;/p&gt;
  &lt;p id=&quot;Z87y&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Identify the structure of kernel memory&lt;/p&gt;
  &lt;p id=&quot;QVKl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Improving buffer overflow protection&lt;/p&gt;
  &lt;p id=&quot;kwn5&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-user-security&quot; target=&quot;_blank&quot;&gt;Introduction to User Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;headlessui-listbox-option-:r3m:&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds&lt;/p&gt;
  &lt;p id=&quot;Do0U&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2&lt;br /&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-rating-for-pre-launch-projects?referralId=14542761996400421215&quot; target=&quot;_blank&quot;&gt;Security Rating for Pre-Launch Projects&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;gRJI&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Market Stability&lt;/p&gt;
  &lt;p id=&quot;BgST&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stage 2&lt;/p&gt;
  &lt;p id=&quot;AYdE&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;i3rn&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-token-holder-analysis?referralId=11249118686618612056&quot; target=&quot;_blank&quot;&gt;Insights on Token Holder Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZjJ7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;k9zH&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Total Value Locked (TVL)&lt;/p&gt;
  &lt;p id=&quot;aSu2&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.High percentage on project owner holding&lt;/p&gt;
  &lt;p id=&quot;53uI&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-activity-monitoring?referralId=10841772136631773812&quot; target=&quot;_blank&quot;&gt;Governance Activity Monitoring&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;8cWh&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It reflects the level of governance activity in comparison to other Web3 projects by aggregating various signals&lt;/p&gt;
  &lt;p id=&quot;RD9c&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;JsH5&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Project&amp;#x27;s financial performance&lt;/p&gt;
  &lt;p id=&quot;W3sB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/github-monitoring-for-better-code-security?referralId=2947965897230806152&quot; target=&quot;_blank&quot;&gt;GitHub Monitoring for Better Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KlXF&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;Jixx&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;X9KO&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False - Introducing new code may also introduce bugs and vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;8elY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security-via-website-scan?referralId=16558688121911411307&quot; target=&quot;_blank&quot;&gt;Operational Security via Website Scan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;59Yk&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Security; DNS Health; Application Security/&lt;/p&gt;
  &lt;p id=&quot;gzXS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;dV2H&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Penetration Testing&lt;/p&gt;
  &lt;p id=&quot;jq8X&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/insights-on-market-analytics?referralId=5200565301090517712&quot; target=&quot;_blank&quot;&gt;Insights on Market Analytics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;mU1C&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fully diluted market cap&lt;/p&gt;
  &lt;p id=&quot;6SSW&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt; 1,2,3&lt;/p&gt;
  &lt;p id=&quot;z7Pu&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;IuhA&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/community-and-security-risks-in-web3?referralId=10551768520323127760&quot; target=&quot;_blank&quot;&gt;Community and Security Risks in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;w1Ip&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Influences market stability and trust&lt;/p&gt;
  &lt;p id=&quot;4yDI&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;4UNt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/market-related-risks?referralId=4859741538501270514&quot; target=&quot;_blank&quot;&gt;Market-Related Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;09Me&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It increases the risk of market manipulation&lt;/p&gt;
  &lt;p id=&quot;b6Ov&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It indicates strong interest and potential liquidity.&lt;/p&gt;
  &lt;p id=&quot;r8mq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/governance-and-security-in-daos?referralId=10450324854265183332&quot; target=&quot;_blank&quot;&gt;Governance and Security in DAOs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qoIV&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Centralization risks in smart contract&lt;/p&gt;
  &lt;p id=&quot;LIvE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;kHnX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/team-and-insider-risks?referralId=7800496360587123548&quot; target=&quot;_blank&quot;&gt;Team and Insider Risks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eKVH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Lack of accountability and transparency&lt;/p&gt;
  &lt;p id=&quot;tjEk&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;MDSx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/operational-security?referralId=4683719194833802030&quot; target=&quot;_blank&quot;&gt;Operational Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;je5j&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;dmCm&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They harness community expertise to identify bugs&lt;/p&gt;
  &lt;p id=&quot;2PSN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/code-security?referralId=17965297244896798201&quot; target=&quot;_blank&quot;&gt;Code Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;fkdK&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and fix potential security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;zS0m&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;vTcq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certik-ventures?referralId=16722289876220779271&quot; target=&quot;_blank&quot;&gt;CertiK Ventures&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;TdhF&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Shiba Inu&lt;/p&gt;
  &lt;p id=&quot;QfG5&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Foster the growth of security-first projects&lt;/p&gt;
  &lt;p id=&quot;1Njt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/web3-security-with-skynet?referralId=772035781796166985&quot; target=&quot;_blank&quot;&gt;Web3 Security with Skynet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;headlessui-listbox-option-:R2qll5n8p6:&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Security Scores&lt;/p&gt;
  &lt;p id=&quot;headlessui-listbox-option-:r2j:&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;bLwF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/rwa-security-and-leaderboard?referralId=10571810790173092755&quot; target=&quot;_blank&quot;&gt;RWA Security and Leaderboard&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ezAs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Conducting regular smart contract audits&lt;/p&gt;
  &lt;p id=&quot;NaKC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;OLIJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-work-versus-proof-of-stake?referralId=17559957049395425841&quot; target=&quot;_blank&quot;&gt;Proof of Work versus Proof of Stake&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dzmz&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Proof of Work&lt;/p&gt;
  &lt;p id=&quot;YIra&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It saves massive amounts of energy&lt;/p&gt;
  &lt;p id=&quot;lgeO&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It has a high bar of entry, making it hard for attackers to manipulate&lt;/p&gt;
  &lt;p id=&quot;148r&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/security-score-impacts-with-okx?referralId=130214319943394590&quot; target=&quot;_blank&quot;&gt;Security Score Impacts with OKX&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;NjVy&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To increase security awareness&lt;/p&gt;
  &lt;p id=&quot;rSV7&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Overall security score and subcategory scores&lt;/p&gt;
  &lt;p id=&quot;hsWw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skynet-pulse-real-time-insights-by-security-experts?referralId=14801632575970093052&quot; target=&quot;_blank&quot;&gt;Skynet Pulse - Real-Time Insights by Security Experts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;headlessui-listbox-option-:r1f:&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt; By clicking on the heart icon at the top of the Skynet homepage&lt;/p&gt;
  &lt;p id=&quot;DRMQ&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;The project’s security score and a link to their Skynet profile&lt;/p&gt;
  &lt;p id=&quot;Sk0w&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;tmZS&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;WEB3 SECURITY(user)&lt;/strong&gt;&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;X0iB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/defending-against-clipper-malware?referralId=16769933747331166454&quot; target=&quot;_blank&quot;&gt;Defending Against Clipper Malware&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dwHI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Replaces copied crypto wallet addresses with hacker-controlled addresses&lt;/p&gt;
  &lt;p id=&quot;gKgq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Messaging apps like WhatsApp and Telegram&lt;/p&gt;
  &lt;p id=&quot;f72u&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Verify wallet addresses before sending funds&lt;/p&gt;
  &lt;p id=&quot;W6v5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-the-security-model-for-optimisms-superchain?referralId=14373133239728815243&quot; target=&quot;_blank&quot;&gt;Exploring the Security Model for Optimism’s Superchain&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;jBVw&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A Layer 2 scaling solution for Ethereum&lt;/p&gt;
  &lt;p id=&quot;dXxU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By posting transaction data to Ethereum&lt;/p&gt;
  &lt;p id=&quot;w0oG&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Fraud proofs&lt;/p&gt;
  &lt;p id=&quot;0gSX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/radiant-capitals-usd50m-defi-hack-response?referralId=11996399708582658270&quot; target=&quot;_blank&quot;&gt;Radiant Capital’s $50M DeFi Hack Response&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;9NJq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By compromising developer hardware wallets with malware&lt;/p&gt;
  &lt;p id=&quot;855O&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Reduced signers to seven, with four required for approval&lt;/p&gt;
  &lt;p id=&quot;cjOZ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.72 hours&lt;/p&gt;
  &lt;p id=&quot;6sk6&quot;&gt;&lt;strong&gt;Quiz:About Satoshi Nakamoto&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;U9Dv&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.2008&lt;/p&gt;
  &lt;p id=&quot;ewxB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2011&lt;/p&gt;
  &lt;p id=&quot;RDXp&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.1 million BTC&lt;/p&gt;
  &lt;p id=&quot;cbja&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/what-is-depin?referralId=15100470899667488769&quot; target=&quot;_blank&quot;&gt;What is DePIN?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ilEY&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Decentralized Physical Infrastructure Network&lt;/p&gt;
  &lt;p id=&quot;w25J&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Filecoin&lt;/p&gt;
  &lt;p id=&quot;i2AX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-crypto-market-manipulation?referralId=5065813419308085663&quot; target=&quot;_blank&quot;&gt;Identifying Crypto Market Manipulation&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ucJx&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To create fake trading activity&lt;/p&gt;
  &lt;p id=&quot;JQlR&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Tokens are artificially inflated and then sold off&lt;/p&gt;
  &lt;p id=&quot;xRXv&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-chain-hopping-and-crypto-money-laundering?referralId=6371277034313326130&quot; target=&quot;_blank&quot;&gt;Understanding Chain Hopping and Crypto Money Laundering&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;95Jo&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By pooling and redistributing cryptocurrencies among multiple users&lt;/p&gt;
  &lt;p id=&quot;lGDv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;x9Sb&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-the-dhs-is-stopping-ransomware-attacks?referralId=15603437711319365322&quot; target=&quot;_blank&quot;&gt;How the DHS is Stopping Ransomware Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;8eSG&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A type of malware that locks data and demands payment to unlock it.&lt;/p&gt;
  &lt;p id=&quot;fbed&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.537&lt;/p&gt;
  &lt;p id=&quot;ctlS&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gathering evidence to prosecute hackers.&lt;/p&gt;
  &lt;p id=&quot;PyFg&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-against-social-engineering-attacks?referralId=17123893867364986672&quot; target=&quot;_blank&quot;&gt;Protecting Against Social Engineering Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lUQn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Tricks aimed at specific individuals to steal sensitive information.&lt;/p&gt;
  &lt;p id=&quot;EpNy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.An email with urgent requests for confidential information.&lt;/p&gt;
  &lt;p id=&quot;jsOF&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Verify the request using a trusted method.&lt;/p&gt;
  &lt;p id=&quot;1YS4&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-etherscan?referralId=8842130191011626299&quot; target=&quot;_blank&quot;&gt;Exploring Etherscan&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JqVM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A search engine for Ethereum&amp;#x27;s blockchain data&lt;/p&gt;
  &lt;p id=&quot;tfAd&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Transaction history, token balances, and NFTs&lt;/p&gt;
  &lt;p id=&quot;Ou3R&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;KR2T&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-aml-and-its-role-in-crypto?referralId=15738321562498690349&quot; target=&quot;_blank&quot;&gt;Intro to AML and its Role in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;c49z&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Placement&lt;/p&gt;
  &lt;p id=&quot;KN3z&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To verify users&amp;#x27; identities&lt;/p&gt;
  &lt;p id=&quot;l7We&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It’s hard to trace transactions&lt;/p&gt;
  &lt;p id=&quot;hjKo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/navigating-nft-security-and-avoiding-scams?referralId=3907516863440339025&quot; target=&quot;_blank&quot;&gt;Navigating NFT Security and Avoiding Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;mrb7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.By checking the creator&amp;#x27;s profile and NFT metadata.&lt;/p&gt;
  &lt;p id=&quot;R5mG&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.In a hardware wallet that supports NFTs.&lt;/p&gt;
  &lt;p id=&quot;if1b&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Enabling two-factor authentication on accounts.&lt;/p&gt;
  &lt;p id=&quot;0aGR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-peel-chain-technique?referralId=6092805390136895237&quot; target=&quot;_blank&quot;&gt;Understanding the Peel Chain Technique&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XzBh&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A laundering technique dividing a large amount into small transactions&lt;/p&gt;
  &lt;p id=&quot;JmKI&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To hide funds through a series of small transactions&lt;/p&gt;
  &lt;p id=&quot;CTxx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-economic-exploits-and-tokenomics?referralId=2877488948817488841&quot; target=&quot;_blank&quot;&gt;Understanding Economic Exploits and Tokenomics&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;comD&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Manipulating financial mechanisms for profit&lt;/p&gt;
  &lt;p id=&quot;VZ55&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It influences decentralization and market stability&lt;/p&gt;
  &lt;p id=&quot;KiWI&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.They prevent token supply from being immediately flooded&lt;/p&gt;
  &lt;p id=&quot;D7Gw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/secure-use-of-exchanges?referralId=6815740301666868655&quot; target=&quot;_blank&quot;&gt;Secure Use of Exchanges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Y7Nc&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Two-Factor Authentication (2FA)&lt;/p&gt;
  &lt;p id=&quot;SIDo&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It stores your cryptocurrency offline, providing better security&lt;/p&gt;
  &lt;p id=&quot;LEYL&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Receiving an unsolicited email with a link to reset your password&lt;/p&gt;
  &lt;p id=&quot;awHr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/dextools-real-time-trading-insights?referralId=4029549202211727132&quot; target=&quot;_blank&quot;&gt;DEXTools | Real-Time Trading Insights&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tPhm&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To provide real-time analytics and insights for decentralized exchanges&lt;/p&gt;
  &lt;p id=&quot;GYKM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Trending 24-Hour Charts&lt;/p&gt;
  &lt;p id=&quot;jLai&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Reduced fees, access to premium features, and participation in governance&lt;/p&gt;
  &lt;p id=&quot;fIHM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/case-study-on-enhancing-security-for-app-chains?referralId=14561032952850902786&quot; target=&quot;_blank&quot;&gt;Case Study on Enhancing Security for App Chains&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;xdOV&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All subsequent transactions failed while nodes appeared operational&lt;/p&gt;
  &lt;p id=&quot;K8L9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Limiting the total number of functions within a contract&lt;/p&gt;
  &lt;p id=&quot;hNZ9&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-soft-rug-vs-hard-rug-pulls?referralId=9963276234478114641&quot; target=&quot;_blank&quot;&gt;Understanding Soft Rug vs. Hard Rug Pulls&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;PKKQ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Developers abandoning and removing liquidity, leaving investors with worthless tokens&lt;/p&gt;
  &lt;p id=&quot;TJyh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Gradual selling of tokens by the development team&lt;/p&gt;
  &lt;p id=&quot;RRcs&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/soc-2-compliance-for-crypto-companies?referralId=8490561579313297340&quot; target=&quot;_blank&quot;&gt;SOC 2 Compliance for Crypto Companies&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JwAg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;pzHq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Security, Availability, Processing Integrity, Confidentiality, and Privacy&lt;/p&gt;
  &lt;p id=&quot;W4OH&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It helps demonstrate a commitment to data security and builds trust with users&lt;/p&gt;
  &lt;p id=&quot;ONHv&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-your-postgresql-database-from-cryptojacking?referralId=7883181834866710561&quot; target=&quot;_blank&quot;&gt;Protecting Your PostgreSQL Database from Cryptojacking&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Sjyu&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;tOzc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Creates a new user account with high privileges&lt;/p&gt;
  &lt;p id=&quot;JjBm&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Using strong, unique passwords and regular system updates&lt;/p&gt;
  &lt;p id=&quot;25Jw&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-and-mitigating-51-attacks?referralId=18013243720688296512&quot; target=&quot;_blank&quot;&gt;Understanding and Mitigating 51% Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Norh&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.An attacker gains control of more than half of the network’s computational power&lt;/p&gt;
  &lt;p id=&quot;ZIT2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-spending of coins&lt;/p&gt;
  &lt;p id=&quot;9tcf&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By distributing mining power widely and adjusting mining difficulty&lt;/p&gt;
  &lt;p id=&quot;yIEM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-to-create-and-maintain-secure-passwords?referralId=13058038752038047591&quot; target=&quot;_blank&quot;&gt;How to Create and Maintain Secure Passwords&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;VSzW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To prevent hackers from accessing multiple accounts&lt;/p&gt;
  &lt;p id=&quot;v7Wf&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.A mix of upper and lower case letters, numbers, and special characters&lt;/p&gt;
  &lt;p id=&quot;JbG7&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Regularly to prevent expired passwords from being useful to hackers&lt;/p&gt;
  &lt;p id=&quot;u3az&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/cold-wallets?referralId=14163199852116713909&quot; target=&quot;_blank&quot;&gt;Cold Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;P214&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Storing your crypto assets offline for safe and long-term storage&lt;/p&gt;
  &lt;p id=&quot;RPmK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paper Wallet, Hardware Wallet, Offline Software Wallet&lt;/p&gt;
  &lt;p id=&quot;vvoM&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Always purchase a wallet directly from the manufacturer, Check on hardware wallet&amp;#x27;s security features&lt;/p&gt;
  &lt;p id=&quot;d3Re&quot;&gt;&lt;strong&gt;Quiz:&lt;/strong&gt;&lt;a href=&quot;https://skynet.certik.com/quest/understanding-and-preventing-sybil-attacks?referralId=15658778574720314134&quot; target=&quot;_blank&quot;&gt;Understanding and Preventing Sybil Attacks&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;1&lt;/strong&gt;.An attack where one person creates multiple identities to take over a network.&lt;br /&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above.&lt;br /&gt;&lt;strong&gt;3&lt;/strong&gt;.By making it impractical and costly for attackers to succeed.&lt;/p&gt;
  &lt;p id=&quot;HPhk&quot;&gt;&lt;strong&gt;Quiz:&lt;/strong&gt;&lt;a href=&quot;https://skynet.certik.com/quest/what-is-a-keylogger?referralId=8707739076659356886&quot; target=&quot;_blank&quot;&gt;What Is a Keylogger?&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;C6M3&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Regularly check USB ports for unfamiliar devices&lt;/p&gt;
  &lt;p id=&quot;ZVj8&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Stealing sensitive information&lt;/p&gt;
  &lt;p id=&quot;yw63&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-malicious-activity-on-websites-and-dapps?referralId=14391326312041387297&quot; target=&quot;_blank&quot;&gt;Identifying Malicious Activity on Websites &amp;amp; dApps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;zbKA&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking&lt;/p&gt;
  &lt;p id=&quot;EcQu&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The URL has subtle differences from the legitimate site, like extra characters or misspellings&lt;/p&gt;
  &lt;p id=&quot;i6Wz&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-user-security?referralId=7357995900959554027&quot; target=&quot;_blank&quot;&gt;Introduction to User Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;bXIf&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds&lt;/p&gt;
  &lt;p id=&quot;nZgl&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Two-Factor Authentication (2FA)&lt;/p&gt;
  &lt;p id=&quot;gaB1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/stay-vigilant-on-browser-plugins?referralId=17950452728626331804&quot; target=&quot;_blank&quot;&gt;Stay Vigilant on Browser Plugins&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;pkBB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Using plugins promoted by users on social platforms&lt;/p&gt;
  &lt;p id=&quot;fAFF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;ZmCW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/losses-related-to-private-key-compromises?referralId=3379987647332406542&quot; target=&quot;_blank&quot;&gt;Losses Related to Private Key Compromises&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qzrH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Nearly $881 million across 47 incidents&lt;/p&gt;
  &lt;p id=&quot;I8gw&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Binance&lt;/p&gt;
  &lt;p id=&quot;3xlo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security-seed-phrases?referralId=17178613058994527673&quot; target=&quot;_blank&quot;&gt;Private Key Security: Seed Phrases&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uSbt&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Create a backup and store it in secure locations&lt;/p&gt;
  &lt;p id=&quot;CueW&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It can be hacked or accessed by unauthorized parties&lt;/p&gt;
  &lt;p id=&quot;ZovK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/private-key-security?referralId=7694637572386990685&quot; target=&quot;_blank&quot;&gt;Private Key Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CcgH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If someone gains access to your private key, they gain access to your crypto assets&lt;/p&gt;
  &lt;p id=&quot;6hoQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Store it offline, preferably in a hardware wallet&lt;/p&gt;
  &lt;p id=&quot;xabd&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/important-exchange-security-features?referralId=16293381021708240115&quot; target=&quot;_blank&quot;&gt;Important Exchange Security Features&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;egd9&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.The exchange has strong information security management systems&lt;/p&gt;
  &lt;p id=&quot;jyDi&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It minimizes the risks associated with using a cryptocurrency exchange&lt;/p&gt;
  &lt;p id=&quot;oEd0&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/website-and-dapp-security?referralId=13278999103800562405&quot; target=&quot;_blank&quot;&gt;Website &amp;amp; dApp Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vNou&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;LVOK&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;The dApp has limited documentation and transparency&lt;/p&gt;
  &lt;p id=&quot;0FGH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-risk-signals-on-the-exchange?referralId=15228800082055343187&quot; target=&quot;_blank&quot;&gt;Recognizing Risk Signals on the Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6hWx&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;They might be recommending a scam or fraudulent scheme&lt;/p&gt;
  &lt;p id=&quot;cC8L&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The exchange has liquidity problems or internal issues&lt;/p&gt;
  &lt;p id=&quot;cIvp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-reserve?referralId=5543442415609451864&quot; target=&quot;_blank&quot;&gt;Proof of Reserve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tDc7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;j3wx&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;UQZP&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/choosing-a-secure-exchange?referralId=15146377076458402765&quot; target=&quot;_blank&quot;&gt;Choosing a Secure Exchange&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;5Lkf&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;All of the above&lt;/p&gt;
  &lt;p id=&quot;dWbO&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;aX4j&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-practices-for-wallet-security?referralId=17172386887916103779&quot; target=&quot;_blank&quot;&gt;Best Practices for Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vcOT&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;fXaA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The recipient’s wallet address to ensure it’s correct&lt;/p&gt;
  &lt;p id=&quot;KmPn&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-wallet-security?referralId=16403428101071015288&quot; target=&quot;_blank&quot;&gt;Introduction to Wallet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;93Jb&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.If the custodial service experiences a security breach, hack, or service itself becomes inaccessible, you may lose access to your private keys.&lt;/p&gt;
  &lt;p id=&quot;FMY9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Storing them in a hardware wallet or encrypted offline location&lt;/p&gt;
  &lt;p id=&quot;c8j2&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/importance-of-bug-bounty-programs-in-web3?referralId=13278395323435539940&quot; target=&quot;_blank&quot;&gt;Importance of Bug Bounty Programs in Web3&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iy89&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;OKvT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use open source expertise for security&lt;/p&gt;
  &lt;p id=&quot;efBV&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. 1,2,3,4&lt;/p&gt;
  &lt;p id=&quot;3x5d&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-airdrop-scams?referralId=12461496521175762681&quot; target=&quot;_blank&quot;&gt;Intro to Airdrop Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;XUtZ&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;False - projects never ask for such information.&lt;/p&gt;
  &lt;p id=&quot;ERNl&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;jQyk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/common-web3-phishing-methods?referralId=6867287355170951518&quot; target=&quot;_blank&quot;&gt;Common Web3 Phishing Methods&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6D0P&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ALy2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;hedq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-cryptocurrency-news-sources?referralId=16644553435179039608&quot; target=&quot;_blank&quot;&gt;Evaluating Cryptocurrency News Sources&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;4ann&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;fN2i&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. 1,2,3,4&lt;/p&gt;
  &lt;p id=&quot;Si9R&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/intro-to-crypto-drainers?referralId=637350153324198711&quot; target=&quot;_blank&quot;&gt;Intro to Crypto Drainers&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;cduN&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;NhrT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;kcQa&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/identifying-and-avoiding-phishing-scams-in-x-replies?referralId=3468589033596343733&quot; target=&quot;_blank&quot;&gt;Identifying and Avoiding Phishing Scams in X Replies&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;0U6T&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Display names on X can be misused to impersonate official accounts, Scammers may disguise themselves using Gold Check accounts on X;&lt;/p&gt;
  &lt;p id=&quot;0Yky&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Same display name as the official account, A very similar username, Same account profile picture;&lt;/p&gt;
  &lt;p id=&quot;soIf&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Users could always trust messages prior to the End of Thread&lt;/p&gt;
  &lt;p id=&quot;mbsr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/sim-swap-attacks?referralId=16139425250616761896&quot; target=&quot;_blank&quot;&gt;SIM Swap Attacks&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IQPG&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Searching the dark web to find your previously leaked information; Browsing through your public social media accounts.&lt;/p&gt;
  &lt;p id=&quot;HT1N&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Use authentication apps like Okta or Authy.&lt;/p&gt;
  &lt;p id=&quot;3LFr&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/protecting-yourself-from-discord-scams?referralId=1042445682667554029&quot; target=&quot;_blank&quot;&gt;Protecting Yourself from Discord Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uex9&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Posting fake offers for free mints or airdrops to exploit FOMO (Fear Of Missing Out)&lt;/p&gt;
  &lt;p id=&quot;gxUr&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Reset your password as soon as possible and ensure 2FA is enabled&lt;/p&gt;
  &lt;p id=&quot;CHep&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/setting-up-a-security-war-room?referralId=17867478544302965192&quot; target=&quot;_blank&quot;&gt;Setting Up a Security War Room&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;X5WM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Secure messaging apps&lt;/p&gt;
  &lt;p id=&quot;D29a&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;They identify weaknesses and improve team coordination&lt;/p&gt;
  &lt;p id=&quot;NSVA&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;PeFc&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hackers-infiltrating-crypto-job-boards?referralId=6430472449098112400&quot; target=&quot;_blank&quot;&gt;Hackers Infiltrating Crypto Job Boards&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;sCq3&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$600 million&lt;/p&gt;
  &lt;p id=&quot;iEGk&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.4,000&lt;/p&gt;
  &lt;p id=&quot;pwbi&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Refusing to turn on the camera&lt;/p&gt;
  &lt;p id=&quot;9tpy&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;p id=&quot;GJLp&quot; data-align=&quot;center&quot;&gt;&lt;strong&gt;CERTIK BLOG(Industry Insights)&lt;/strong&gt;&lt;/p&gt;
  &lt;/section&gt;
  &lt;p id=&quot;Rbra&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/exploring-the-rise-of-ai-memecoins?referralId=1645591723833842933&quot; target=&quot;_blank&quot;&gt;Exploring the Rise of AI Memecoins&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6A2T&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Increased retail trading and viral hype&lt;/p&gt;
  &lt;p id=&quot;wKBU&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Solana&lt;/p&gt;
  &lt;p id=&quot;YiMB&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Memecoins are launched with all supply unlocked&lt;/p&gt;
  &lt;p id=&quot;R8Mo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/proof-of-history-overview?referralId=3255928297795011014&quot; target=&quot;_blank&quot;&gt;Proof of History Overview&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;FSHY&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A cryptographic time-keeping mechanism&lt;/p&gt;
  &lt;p id=&quot;aOHv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.SHA-256&lt;/p&gt;
  &lt;p id=&quot;YpYL&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By reducing the time needed for transaction ordering&lt;/p&gt;
  &lt;p id=&quot;t5Kd&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.To achieve high throughput and scalability&lt;/p&gt;
  &lt;p id=&quot;VMPZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/unmasking-crypto-market-manipulation?referralId=15565306715015506163&quot; target=&quot;_blank&quot;&gt;Unmasking Crypto Market Manipulation&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CVuI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Buying and selling an asset to create fake trading volume&lt;/p&gt;
  &lt;p id=&quot;Tkst&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Placing large fake orders to manipulate prices&lt;/p&gt;
  &lt;p id=&quot;Q2Nr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Coordinated buying followed by mass selling&lt;/p&gt;
  &lt;p id=&quot;gzyy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/truth-terminal-an-ai-and-a-crypto-millionaire?referralId=8781109133763635968&quot; target=&quot;_blank&quot;&gt;Truth Terminal - An AI and a Crypto Millionaire&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;jpAn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;OaBv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$50,000 in BTC&lt;/p&gt;
  &lt;p id=&quot;2nNj&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/interview-with-professor-ronghui-gu-who-monitors-the-monitors?referralId=2714353996158414390&quot; target=&quot;_blank&quot;&gt;Interview with Professor Ronghui Gu: &amp;quot;Who Monitors the Monitors?&amp;quot;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;UiUU&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.50%&lt;/p&gt;
  &lt;p id=&quot;9Alo&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By making them public on the Skynet platform&lt;/p&gt;
  &lt;p id=&quot;3EmP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Decentralizing authentication and data storage&lt;/p&gt;
  &lt;p id=&quot;A7N0&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-us-crypto-tax-forms?referralId=14917579774669395944&quot; target=&quot;_blank&quot;&gt;Understanding U.S. Crypto Tax Forms&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Xi64&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Form 8949&lt;/p&gt;
  &lt;p id=&quot;3Ln6&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;TifP&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The duration the asset was held&lt;/p&gt;
  &lt;p id=&quot;Q3GN&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-part-2-major-hacks-of-q3-2024?referralId=6920465006978566901&quot; target=&quot;_blank&quot;&gt;Hack3d Part 2: Major Hacks of Q3 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KXjG&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$238 million&lt;/p&gt;
  &lt;p id=&quot;SVUF&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Private key theft&lt;/p&gt;
  &lt;p id=&quot;UFoi&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-part-1-most-common-attack-in-q3-2024?referralId=1134170039223354539&quot; target=&quot;_blank&quot;&gt;Hack3d Part 1: Most Common Attack Vectors in Q3 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;0huR&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;BKLE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Double-check URLs and email addresses for legitimacy&lt;/p&gt;
  &lt;p id=&quot;AfXN&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/certik-uncovers-vulnerability-in-apple-vision-pro?referralId=18204126597715039781&quot; target=&quot;_blank&quot;&gt;CertiK Uncovers Vulnerability in Apple Vision Pro&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;IFmB&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.GAZEploit&lt;/p&gt;
  &lt;p id=&quot;vTG9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.92%&lt;/p&gt;
  &lt;p id=&quot;vDmd&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Six times&lt;/p&gt;
  &lt;p id=&quot;m842&quot;&gt;&lt;strong&gt;Quiz: &lt;a href=&quot;https://skynet.certik.com/quest/a-usd230m-bitcoin-scam-uncovered?referralId=4999350706214614322&quot; target=&quot;_blank&quot;&gt;A $230M Bitcoin Scam Uncovered&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;l2vr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.4,100 BTC&lt;/p&gt;
  &lt;p id=&quot;Dhed&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Posing as Google and Gemini support&lt;/p&gt;
  &lt;p id=&quot;pRpC&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-derec-alliance?referralId=11958568339849254318&quot; target=&quot;_blank&quot;&gt;Understanding the DeRec Alliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vDKO&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Standardize secrets management and recovery&lt;/p&gt;
  &lt;p id=&quot;rYl8&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By using encrypted fragments held by multiple helpers&lt;/p&gt;
  &lt;p id=&quot;H5kB&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Support for on-chain and off-chain secrets&lt;/p&gt;
  &lt;p id=&quot;YXrS&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-android-spyagent-campaign?referralId=9689426293020000996&quot; target=&quot;_blank&quot;&gt;Understanding the Android SpyAgent Campaign&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;bgvl&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Mnemonic recovery phrases&lt;/p&gt;
  &lt;p id=&quot;p0CZ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Phishing campaigns&lt;/p&gt;
  &lt;p id=&quot;L6Ya&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/fbi-warns-of-crypto-social-engineering?referralId=1672117372965037986&quot; target=&quot;_blank&quot;&gt;FBI warns of Crypto Social Engineering&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qIkR&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Impersonating well-known individuals&lt;/p&gt;
  &lt;p id=&quot;t2fA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verify the offer through official channels&lt;/p&gt;
  &lt;p id=&quot;K0bl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Use security software and verify sources&lt;/p&gt;
  &lt;p id=&quot;rOiu&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/web2-meets-web3-hacking-decentralized-applications?referralId=2037822529317149674&quot; target=&quot;_blank&quot;&gt;Web2 Meets Web3: Hacking Decentralized Applications&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;c50I&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Integration of Web2 vulnerabilities and blockchain-specific issues&lt;/p&gt;
  &lt;p id=&quot;nwMQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Full-Scale Dapp&lt;/p&gt;
  &lt;p id=&quot;SfxW&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By injecting malicious JavaScript to initiate unauthorized transactions&lt;/p&gt;
  &lt;p id=&quot;JHdK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/evaluating-popular-web3-messaging-apps?referralId=6168210370666611473&quot; target=&quot;_blank&quot;&gt;Evaluating Popular Web3 Messaging Apps&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;quDd&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Signal&lt;/p&gt;
  &lt;p id=&quot;Qghh&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Telegram&lt;/p&gt;
  &lt;p id=&quot;ysIe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-ai-role-in-enhancing-web3-security?referralId=12107951350394582841&quot; target=&quot;_blank&quot;&gt;Understanding AI&amp;#x27;s Role in Enhancing Web3 Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yVnM&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;It enhances transparency and security.&lt;/p&gt;
  &lt;p id=&quot;p5x1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.They offer data security.&lt;/p&gt;
  &lt;p id=&quot;O0N8&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;QMgp&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-account-abstraction?referralId=15860065917261768287&quot; target=&quot;_blank&quot;&gt;Introduction to Account Abstraction&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;qI7e&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Allowing for transactions to be conducted fully anonymously&lt;/p&gt;
  &lt;p id=&quot;oXvy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.All of the above&lt;/p&gt;
  &lt;p id=&quot;gAEK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-binance-clawed-back-73m-in-stolen-funds?referralId=14761267669134044198&quot; target=&quot;_blank&quot;&gt;How Binance Clawed Back $73M in Stolen Funds&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;5GXH&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;80%&lt;/p&gt;
  &lt;p id=&quot;gytP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$55 million&lt;/p&gt;
  &lt;p id=&quot;Gabo&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Increased market growth and volatility&lt;/p&gt;
  &lt;p id=&quot;kAh4&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/navigating-dao-governance-and-the-compound-dao-incident?referralId=11636985650225362142&quot; target=&quot;_blank&quot;&gt;Navigating DAO Governance and the Compound DAO Incident&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;aAoQ&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The funds would be stored in a vault controlled by them&lt;/p&gt;
  &lt;p id=&quot;0z0x&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Limited Liability Corporation (LLC)&lt;/p&gt;
  &lt;p id=&quot;Zq1d&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Implementing weekend-free voting and experimenting with AI proxy voting&lt;/p&gt;
  &lt;p id=&quot;Enqk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mastering-bridge-tracing?referralId=4387850454504137944&quot; target=&quot;_blank&quot;&gt;Mastering Bridge Tracing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;txh9&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To uniquely identify a specific blockchain network&lt;/p&gt;
  &lt;p id=&quot;1aB6&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Timing Analysis&lt;/p&gt;
  &lt;p id=&quot;TtMR&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The destination chain and recipient address&lt;/p&gt;
  &lt;p id=&quot;QDwJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/vanity-address-and-address-poisoning?referralId=3878179306081855581&quot; target=&quot;_blank&quot;&gt;Vanity Address and Address Poisoning&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JMnn&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Sending funds to a scam address&lt;/p&gt;
  &lt;p id=&quot;Pf7z&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Always double-check the entire address&lt;/p&gt;
  &lt;p id=&quot;xgNT&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;7IOC&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/utopiasphere-incident-analysis?referralId=1437817724685870593&quot; target=&quot;_blank&quot;&gt;UtopiaSphere Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;yfNE&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$521K&lt;/p&gt;
  &lt;p id=&quot;Etp1&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.swapBurn()&lt;/p&gt;
  &lt;p id=&quot;X5iX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-ai-is-transforming-kyc-for-crypto-project-teams?referralId=3295661274152174365&quot; target=&quot;_blank&quot;&gt;How AI is Transforming KYC for Crypto Project Teams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;pD4i&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Increased precision and speed in verifying identities&lt;/p&gt;
  &lt;p id=&quot;941z&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;CCfR&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/advanced-formal-verification-of-zk-proofs?referralId=5365226223979668280&quot; target=&quot;_blank&quot;&gt;Advanced Formal Verification of ZK Proofs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;evGk&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A way to verify the correctness of a computation without revealing its details.&lt;/p&gt;
  &lt;p id=&quot;ESNz&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;6mlh&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/sonne-finance-incident-analysis?referralId=643214292471386427&quot; target=&quot;_blank&quot;&gt;Sonne Finance Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ut7R&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;EJBj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$20 million&lt;/p&gt;
  &lt;p id=&quot;6VXt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/bot-driven-wash-trading-in-exit-scams?referralId=10065643524715908161&quot; target=&quot;_blank&quot;&gt;Bot-Driven Wash Trading in Exit Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LwzF&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;RlGq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Disperse.app, CoinTool&lt;/p&gt;
  &lt;p id=&quot;zimT&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. 1,2,3&lt;/p&gt;
  &lt;p id=&quot;oA19&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hedgey-finance-event-analysis?referralId=12210450698186517410&quot; target=&quot;_blank&quot;&gt;Hedgey Finance Event Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;dXXq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ql02&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$2 million&lt;/p&gt;
  &lt;p id=&quot;2I7B&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/top-compliance-risks-in-crypto?referralId=16399802578092275294&quot; target=&quot;_blank&quot;&gt;Top Compliance Risks in Crypto&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3ryZ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Exposure to illicit activities&lt;/p&gt;
  &lt;p id=&quot;ScL4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;4OTM&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By maintaining a repository of global regulations&lt;/p&gt;
  &lt;p id=&quot;96FF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/recognizing-the-misuse-of-certiks-brand?referralId=8907532782619814531&quot; target=&quot;_blank&quot;&gt;Recognizing the Misuse of CertiK&amp;#x27;s Brand&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;lQJ7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Verify their credentials using CertiK’s Employee Verification tool&lt;/p&gt;
  &lt;p id=&quot;hO0O&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;zlLo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-of-diamond-agency-contract?referralId=3170796198508340067&quot; target=&quot;_blank&quot;&gt;Introduction of Diamond Agency Contract&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;9Ldn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;gcIB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To prevent unauthorized access to privileged roles&lt;/p&gt;
  &lt;p id=&quot;xv1V&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-exit-scammers-mint-tokens-undetected?referralId=11461917608113812911&quot; target=&quot;_blank&quot;&gt;How Exit Scammers Mint Tokens Undetected&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uRbd&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Bypassing the totalSupply metric&lt;/p&gt;
  &lt;p id=&quot;LFq2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;UQHP&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/introduction-to-formal-verification?referralId=13411599581235529462&quot; target=&quot;_blank&quot;&gt;Introduction to Formal Verification&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;eKiX&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;kGGX&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Defining properties of contracts to be verified&lt;/p&gt;
  &lt;p id=&quot;xOKo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/different-mechanisms-for-honeypot-scams?referralId=13131013968688026695&quot; target=&quot;_blank&quot;&gt;Different Mechanisms for Honeypot Scams&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ybza&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;An all-green chart with no sells&lt;/p&gt;
  &lt;p id=&quot;z7hd&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;False&lt;/p&gt;
  &lt;p id=&quot;rbBJ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/trap-phishing-on-trusted-platforms?referralId=5534648585449167689&quot; target=&quot;_blank&quot;&gt;Trap Phishing on Trusted Platforms&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;OEks&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Crypto wallet private keys and mnemonic phrases&lt;/p&gt;
  &lt;p id=&quot;pa4C&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ikfe&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/how-certik-does-kyc?referralId=3191862940480632527&quot; target=&quot;_blank&quot;&gt;How CertiK Does KYC&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;DUQe&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;9lcT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Video Call, ID Check, Review &amp;amp; Award&lt;/p&gt;
  &lt;p id=&quot;i8ca&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;LWWc&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/best-tools-for-tracking-top-crypto-wallets?referralId=545797772777247317&quot; target=&quot;_blank&quot;&gt;Best Tools for Tracking Top Crypto Wallets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LH5C&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Dune Analytics&lt;/p&gt;
  &lt;p id=&quot;uBmt&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;QM3m&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Monitoring crypto market trends&lt;/p&gt;
  &lt;p id=&quot;TsxH&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/unveiling-the-kyc-actor-industry?referralId=393510631026831734&quot; target=&quot;_blank&quot;&gt;Unveiling the KYC Actor Industry&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;xExn&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Passing regular verifications is easy&lt;/p&gt;
  &lt;p id=&quot;2xmj&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To steal funds from investors&lt;/p&gt;
  &lt;p id=&quot;0eYM&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;Thorough background investigation by professional investigators&lt;/p&gt;
  &lt;p id=&quot;fTli&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/kyc-actors-are-ramping-up-their-game?referralId=7649034908515735064&quot; target=&quot;_blank&quot;&gt;KYC Actors are Ramping Up Their Game&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;s8Tu&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Fraudsters are hiring professional actors to circumvent due diligence&lt;/p&gt;
  &lt;p id=&quot;lmtP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Verify development teams and prevent fraud&lt;/p&gt;
  &lt;p id=&quot;3Mcp&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.To open bank accounts and store illicit funds&lt;/p&gt;
  &lt;p id=&quot;iclx&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/build-trust-and-integrity-in-project-teams-with-kyc?referralId=11895142972749046720&quot; target=&quot;_blank&quot;&gt;Build trust and integrity in project teams with KYC&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;xi9g&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It helps users trust the team behind a project&lt;/p&gt;
  &lt;p id=&quot;7G9I&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The project team has undergone a thorough identity verification process&lt;/p&gt;
  &lt;p id=&quot;GjMq&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By conducting rigorous identity checks on core team members&lt;/p&gt;
  &lt;p id=&quot;OGVL&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-rounding-issue-exploits?referralId=10066772472273759914&quot; target=&quot;_blank&quot;&gt;HACK3D Part 3: Rounding Issue Exploits&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;DKTQ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Newly-deployed lending pools&lt;/p&gt;
  &lt;p id=&quot;Lxg7&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Drainage of funds&lt;/p&gt;
  &lt;p id=&quot;arEr&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;tWlq&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-private-key-compromise?referralId=3790705653166222356&quot; target=&quot;_blank&quot;&gt;HACK3D Part 2: Private Key Compromise&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Mebd&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.$239 million&lt;/p&gt;
  &lt;p id=&quot;YmA2&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Chris Larsen&lt;/p&gt;
  &lt;p id=&quot;LNJa&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;febM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-top-incident-analyses?referralId=3341046178123889208&quot; target=&quot;_blank&quot;&gt;HACK3D Part 1: Top Incident Analyses&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CwsR&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Network Congestion&lt;/p&gt;
  &lt;p id=&quot;GI2o&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The stolen assets were returned to the Munchables team&lt;/p&gt;
  &lt;p id=&quot;vpm6&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.The CEO&amp;#x27;s resignation&lt;/p&gt;
  &lt;p id=&quot;kzmj&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-the-impact-of-fit21-on-crypto-compliance?referralId=15340865825240135681&quot; target=&quot;_blank&quot;&gt;Understanding the Impact of FIT21 on Crypto Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;I03p&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;j6VT&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To foster innovation and growth&lt;/p&gt;
  &lt;p id=&quot;0TtK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/normie-incident-analysis?referralId=5775616935336737865&quot; target=&quot;_blank&quot;&gt;Normie Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;q8VJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;. A Smart Contract Audit&lt;/p&gt;
  &lt;p id=&quot;FmtQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Allowing any address receiving a specific number of tokens to become a premarket_user&lt;/p&gt;
  &lt;p id=&quot;AfxW&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skyinsights-crypto-compliance?referralId=1950400298119381327&quot; target=&quot;_blank&quot;&gt;SkyIns1ights: Crypto Compliance&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;v5Q7&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To identify and analyze suspicious activities in cryptocurrency transactions&lt;/p&gt;
  &lt;p id=&quot;TYBv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.FinCEN&lt;/p&gt;
  &lt;p id=&quot;vuwp&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Entity Labeling &amp;amp; Categorization; Asset Movement Tracing and Logging; Customizable Case Management &amp;amp; Audit Trails.&lt;/p&gt;
  &lt;p id=&quot;wSYY&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/skyknight?referralId=218155599496482307&quot; target=&quot;_blank&quot;&gt;SkyKnight&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;g7Oy&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To offer a fast and detailed security assessment tool for memecoins&lt;/p&gt;
  &lt;p id=&quot;fJoS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Deep analysis of smart contract code and comprehensive reporting&lt;/p&gt;
  &lt;p id=&quot;4lPa&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Investors and developers&lt;/p&gt;
  &lt;p id=&quot;vck6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/okx-and-certik-fast-pass-program?referralId=15462949631044153544&quot; target=&quot;_blank&quot;&gt;OKX and CertiK Fast Pass Program&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Mqmp&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Providing rigorous security audits for projects&lt;/p&gt;
  &lt;p id=&quot;Mlxy&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By receiving regular updates and detailed security reports&lt;/p&gt;
  &lt;p id=&quot;KLbh&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/basics-of-hackathons?referralId=15059159019155060961&quot; target=&quot;_blank&quot;&gt;Basics of Hackathons&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kXSg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;BKsc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Small Teams&lt;/p&gt;
  &lt;p id=&quot;2XuK&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-report-q2-h1-2024-overview-and-key-highlights?referralId=1771266537997594336&quot; target=&quot;_blank&quot;&gt;Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;nFiI&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Phishing&lt;/p&gt;
  &lt;p id=&quot;WtG9&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$1.19 billion&lt;/p&gt;
  &lt;p id=&quot;TUPB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hack3d-report-q2-h1-2024-insights-and-future-security-enhancements?referralId=15990728660013628100&quot; target=&quot;_blank&quot;&gt;Hack3d Report Q2 H1 2024 - Part 2: Insights and Future Security Enhancements&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;EZr6&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The need for user education and enhanced verification processes&lt;/p&gt;
  &lt;p id=&quot;ibhX&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Meticulously verifying wallet addresses before transactions&lt;/p&gt;
  &lt;p id=&quot;cJGo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/the-memecoin-markets-of-springfield?referralId=15058874098420615559&quot; target=&quot;_blank&quot;&gt;The Memecoin Markets of Springfield&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;vgG5&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;tPrQ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;YCJQ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Chief Wiggum&lt;/p&gt;
  &lt;p id=&quot;QsS1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/top-performing-cryptocurrencies-of-h1-2024?referralId=11048434819269321528&quot; target=&quot;_blank&quot;&gt;Top Performing Cryptocurrencies of H1 2024&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;iXEC&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.To form a decentralized AI alliance&lt;/p&gt;
  &lt;p id=&quot;6gEB&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.FLOKI&lt;/p&gt;
  &lt;p id=&quot;ysJF&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ordinals-and-the-brc-20-standard?referralId=13678169433135283710&quot; target=&quot;_blank&quot;&gt;Ordinals and the BRC-20 Standard&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Fmqr&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Token creation and transfer&lt;/p&gt;
  &lt;p id=&quot;iilK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;xpOt&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/certiks-journey-to-samsungs-security-hall-of-fame?referralId=2311989611534668750&quot; target=&quot;_blank&quot;&gt;CertiK&amp;#x27;s Journey to Samsung&amp;#x27;s Security Hall of Fame&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;oGqs&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Secured a top five place in Samsung&amp;#x27;s Mobile Security Hall of Fame&lt;/p&gt;
  &lt;p id=&quot;d3Z7&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Seven&lt;/p&gt;
  &lt;p id=&quot;I4Kl&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Critical and high severity vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;9r6e&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wazirx-hack-incident-analysis?referralId=4279478896426646772&quot; target=&quot;_blank&quot;&gt;WazirX Hack Incident Analysis&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZVXM&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Compromised private key in a multisig wallet&lt;/p&gt;
  &lt;p id=&quot;Gzkv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Paused all trading and withdrawals&lt;/p&gt;
  &lt;p id=&quot;NCCM&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;10% of the total amount&lt;/p&gt;
  &lt;p id=&quot;2p22&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/understanding-bgp-hijacking-and-internet-routing-security?referralId=5134984396529824814&quot; target=&quot;_blank&quot;&gt;Understanding BGP Hijacking and Internet Routing Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;SCyu&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Diverting traffic by announcing unauthorized IP address blocks&lt;/p&gt;
  &lt;p id=&quot;ypmp&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Resource Public Key Infrastructure (RPKI), Route Origin Authorization (ROA), Route Origin Validation (ROV);&lt;/p&gt;
  &lt;p id=&quot;SVPw&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;Losses of $1.9 million&lt;/p&gt;
  &lt;p id=&quot;Q0H8&quot;&gt;&lt;/p&gt;
  &lt;section style=&quot;background-color:hsl(hsl(24,  24%, var(--autocolor-background-lightness, 95%)), 85%, 85%);&quot;&gt;
    &lt;h3 id=&quot;2c1s&quot; data-align=&quot;center&quot;&gt;PROJECT FOCUS(Spotlights)&lt;/h3&gt;
  &lt;/section&gt;
  &lt;p id=&quot;OuJz&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/metamask-overview?referralId=5143181676712375008&quot; target=&quot;_blank&quot;&gt;MetaMask Overview&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;AhjP&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Serving as an Ethereum wallet and gateway to DApps.&lt;/p&gt;
  &lt;p id=&quot;Hwpn&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By providing a Secret Recovery Phrase for wallet recovery.&lt;/p&gt;
  &lt;p id=&quot;k8NZ&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Connecting to unverified or suspicious DApps.&lt;/p&gt;
  &lt;p id=&quot;fD7z&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/phantom-wallet-solana-and-web3-wallet?referralId=10992396914883809058&quot; target=&quot;_blank&quot;&gt;Phantom Wallet | Solana and Web3 Wallet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;CRcJ&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Ability to store and manage Solana tokens and NFTs&lt;/p&gt;
  &lt;p id=&quot;X1o4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;1lI5&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Up to $50,000 in rewards for reporting security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;M5XX&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wexo-global-payment-infrastructure?referralId=2334550911270168402&quot; target=&quot;_blank&quot;&gt;WEXO | Global Payment Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Ievy&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Allows conversion between digital and fiat currencies within the wallet&lt;/p&gt;
  &lt;p id=&quot;bvkc&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Bitcoin Lightning POS&lt;/p&gt;
  &lt;p id=&quot;phtd&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.By allowing access to premium features and reduced transaction fees within the platform&lt;/p&gt;
  &lt;p id=&quot;euGb&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.Regular security audits linked to on-chain verified smart contracts&lt;/p&gt;
  &lt;p id=&quot;lNkl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/okx-wallet-multi-chain-web3-wallet?referralId=2679109542082294377&quot; target=&quot;_blank&quot;&gt;OKX Wallet | Multi-Chain Web3 Wallet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;5jka&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.DEX &amp;amp; Bridge Aggregator&lt;/p&gt;
  &lt;p id=&quot;8DwM&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Overview of digital assets, portfolio performance, and transaction history&lt;/p&gt;
  &lt;p id=&quot;SCvl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/polymarket-prediction-markets?referralId=2965004492508219695&quot; target=&quot;_blank&quot;&gt;Polymarket | Prediction Markets&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;R0mh&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.It operates without the need for intermediaries, using blockchain technology for decentralized control.&lt;/p&gt;
  &lt;p id=&quot;IqXS&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Prices fluctuate based on the collective trading activity and predictions of users.&lt;/p&gt;
  &lt;p id=&quot;bB7P&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.A bug bounty program with rewards of up to $1,000,000 for identifying security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;Hqb6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/script-network-open-source-video-protocol?referralId=15110582946357075993&quot; target=&quot;_blank&quot;&gt;Script Network | Open Source Video Protocol&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;1.&lt;/strong&gt;A Layer 1 open-source live TV platform, protocol, and storage network&lt;br /&gt;&lt;strong&gt;2.&lt;/strong&gt;Governance and staking&lt;br /&gt;&lt;strong&gt;3&lt;/strong&gt;.By completing security assessments, maintaining an active KYC verification, and a bug bounty program&lt;br /&gt;&lt;strong&gt;4.&lt;/strong&gt;Watch multiple channels 24/7/365 and earn rewards&lt;/p&gt;
  &lt;p id=&quot;ln64&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/worldcoin-or-store-of-value?referralId=8909989351846476171&quot; target=&quot;_blank&quot;&gt;Worldcoin | Store of Value&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;uzkD&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;Tckr&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Operators could bypass verification without proper ID.&lt;/p&gt;
  &lt;p id=&quot;1uB0&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/friendtech?referralId=12655297629852102447&quot; target=&quot;_blank&quot;&gt;FriendTech | Social&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;maN4&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.False&lt;/p&gt;
  &lt;p id=&quot;cgLA&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Rewards of up to 1,000,000 USDC based on bug severity&lt;/p&gt;
  &lt;p id=&quot;h88E&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ethena?referralId=11651827827178316112&quot; target=&quot;_blank&quot;&gt;Ethena | Stablecoin&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Z4tn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Delta hedging&lt;/p&gt;
  &lt;p id=&quot;ckvQ&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Internet Bond&lt;/p&gt;
  &lt;p id=&quot;Kfe6&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/eigenlayer?referralId=2150556762092745992&quot; target=&quot;_blank&quot;&gt;EigenLayer | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Uqtg&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Shared security model leveraging staked ETH&lt;/p&gt;
  &lt;p id=&quot;xpC0&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.To provide a safety net in case of protocol failures or hacks&lt;/p&gt;
  &lt;p id=&quot;AEzM&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/wormhole?referralId=3031551934819834370&quot; target=&quot;_blank&quot;&gt;Wormhole | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;q4Aq&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;AYEE&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.$5M&lt;/p&gt;
  &lt;p id=&quot;pb88&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ripple-xrp-ledger?referralId=3126039791665756896&quot; target=&quot;_blank&quot;&gt;Ripple (XRP Ledger) | Layer 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;6Svj&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;The security of its Automated Market Maker (AMM) implementation&lt;/p&gt;
  &lt;p id=&quot;o935&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Highly active and engaged&lt;/p&gt;
  &lt;p id=&quot;dT7b&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ton?referralId=15885095932325318202&quot; target=&quot;_blank&quot;&gt;TON | Layer 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;KjuV&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Ensures consistency and security across the network&lt;/p&gt;
  &lt;p id=&quot;AJGe&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Over 100,000 TPS&lt;/p&gt;
  &lt;p id=&quot;OeP5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/ondo-finance?referralId=6150060403471369825&quot; target=&quot;_blank&quot;&gt;Ondo Finance | RWA&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;YwI5&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;True&lt;/p&gt;
  &lt;p id=&quot;ygt0&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Conducts compliance checks and engages with regulatory bodies&lt;/p&gt;
  &lt;p id=&quot;V2Rm&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/zkswap-finance?referralId=8655475631583067283&quot; target=&quot;_blank&quot;&gt;zkSwap Finance | DeFi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;8V0l&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Swap to Earn&lt;/p&gt;
  &lt;p id=&quot;4Eth&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt; 6&lt;/p&gt;
  &lt;p id=&quot;headlessui-listbox-option-:r1rf:&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt; False - The team has been KYC verified by CertiK&lt;/p&gt;
  &lt;p id=&quot;I9JZ&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/aptos?referralId=14743960922308816577&quot; target=&quot;_blank&quot;&gt;Aptos | Layer 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;wOFe&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;A developer-friendly environment, focusing on scalability and security&lt;/p&gt;
  &lt;p id=&quot;VD04&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;ybBo&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/pepe?referralId=13779578226808512813&quot; target=&quot;_blank&quot;&gt;PEPE | Meme&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;RolH&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Undergoing a CertiK audit of its token contract&lt;/p&gt;
  &lt;p id=&quot;epnK&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The top 10 holders own less than 5% of the total supply.&lt;/p&gt;
  &lt;p id=&quot;ABIO&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/arbitrum-layer-2?referralId=2769198078991306554&quot; target=&quot;_blank&quot;&gt;Arbitrum | Layer 2&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;JPVs&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.Offchain Labs&lt;/p&gt;
  &lt;p id=&quot;yQZv&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Yes - $2,000,000&lt;/p&gt;
  &lt;p id=&quot;9rzB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/diamante-blockchain-infrastructure?referralId=9924102790695002822&quot; target=&quot;_blank&quot;&gt;Diamante Blockchain | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;LObn&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.No Medium, Major, or Critical issues&lt;/p&gt;
  &lt;p id=&quot;earP&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.The team has been comprehensively verified, demonstrating high transparency&lt;/p&gt;
  &lt;p id=&quot;Mi7d&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.PayCircle and CreditCircle&lt;/p&gt;
  &lt;p id=&quot;A9i1&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/core-dao-infrastructure?referralId=17279057383833825566&quot; target=&quot;_blank&quot;&gt;Core DAO | Infrastructure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;MBLF&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;1S5c&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Satoshi Plus consensus mechanism&lt;/p&gt;
  &lt;p id=&quot;IjPB&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/paw-chain-ecosystem?referralId=2224306640283722749&quot; target=&quot;_blank&quot;&gt;PAW Chain | Ecosystem&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;1trW&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.3&lt;/p&gt;
  &lt;p id=&quot;qfIC&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2&lt;/p&gt;
  &lt;p id=&quot;2b1x&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.4&lt;/p&gt;
  &lt;p id=&quot;Qrs7&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/edu3labs-the-future-of-education?referralId=16883100990799124666&quot; target=&quot;_blank&quot;&gt;Edu3Labs | The Future of Education&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;SP7T&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.AI, Education, Blockchain;&lt;/p&gt;
  &lt;p id=&quot;fwBJ&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.Gold&lt;/p&gt;
  &lt;p id=&quot;yeq6&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gate.io, MEXC&lt;/p&gt;
  &lt;p id=&quot;ukBy&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/trinique-RAT?referralId=8887963175685164762&quot; target=&quot;_blank&quot;&gt;Trinique | RAT&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;NRRc&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.TNQ&lt;/p&gt;
  &lt;p id=&quot;Jrsf&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.True&lt;/p&gt;
  &lt;p id=&quot;94Dh&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Gold&lt;/p&gt;
  &lt;p id=&quot;lOl4&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mint-club-build-your-bonding-curve?referralId=14252588002499273366&quot; target=&quot;_blank&quot;&gt;Mint Club | Build Your Bonding Curve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;fZYp&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;2&lt;/p&gt;
  &lt;p id=&quot;XL29&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.2&lt;/p&gt;
  &lt;p id=&quot;vfDA&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;3&lt;/p&gt;
  &lt;p id=&quot;zWpk&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mint-club-building-your-bonding-curve?referralId=7745391982668529068&quot; target=&quot;_blank&quot;&gt;Mint Club | Building Your Bonding Curve&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;F4vL&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.ERC20 tokens and ERC1155 NFTs&lt;/p&gt;
  &lt;p id=&quot;SRza&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.It lets creators easily set royalties from 0% to 50% on their assets.&lt;/p&gt;
  &lt;p id=&quot;g4Vp&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It simplifies the airdrop process with Public and Private options.&lt;/p&gt;
  &lt;p id=&quot;Kl1V&quot;&gt;&lt;strong&gt;4.&lt;/strong&gt;It allows creators to distribute tokens or NFTs on over 12 networks.&lt;/p&gt;
  &lt;p id=&quot;20eA&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/hanchain-transforming-music-copyright?referralId=3124977293317126668&quot; target=&quot;_blank&quot;&gt;HanChain | Transforming Music Copyright&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;s6Ze&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;MusiKhan, NFT-PLAY, AdKhan, and staking options&lt;/p&gt;
  &lt;p id=&quot;3LuG&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;Top 10% security score, Certik&amp;#x27;s KYC verification, and ISO27001 certification&lt;/p&gt;
  &lt;p id=&quot;48TG&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;Copyright protection and fair compensation through royalties&lt;/p&gt;
  &lt;p id=&quot;VnJ5&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/opengpu-harnessing-decentralized-gpu-computing?referralId=13741414183512089008&quot; target=&quot;_blank&quot;&gt;OpenGPU | Harnessing Decentralized GPU Computing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;oJXA&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;Decentralized GPU computing&lt;/p&gt;
  &lt;p id=&quot;PDgq&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.5000&lt;/p&gt;
  &lt;p id=&quot;ZvIO&quot;&gt;&lt;strong&gt;3.&lt;/strong&gt;To test and innovate with advanced tools&lt;/p&gt;
  &lt;p id=&quot;4xkm&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By joining the decentralized computing network&lt;/p&gt;
  &lt;p id=&quot;MT63&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/patex-the-latam-blockchain-ecosystem?referralId=15031244999995108287&quot; target=&quot;_blank&quot;&gt;Patex | Latin American Blockchain Ecosystems&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;tqQq&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;.A comprehensive solution for the LATAM region&lt;/p&gt;
  &lt;p id=&quot;pt9k&quot;&gt;&lt;strong&gt;2.&lt;/strong&gt;To solve scalability issues, increase transaction speeds, and reduce fees&lt;/p&gt;
  &lt;p id=&quot;BGgS&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.It serves as the main currency for transactions&lt;/p&gt;
  &lt;p id=&quot;QK3m&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;.By identifying and fixing security vulnerabilities&lt;/p&gt;
  &lt;p id=&quot;8QTl&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/solidus-ai-tech-high-performance-computing?referralId=18112948996501595487&quot; target=&quot;_blank&quot;&gt;Solidus AI Tech | High-Performance Computing&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;x39f&quot;&gt;&lt;strong&gt;1&lt;/strong&gt;. Active bug bounty program, Team KYC verification, Security audit with automated formal verification;&lt;/p&gt;
  &lt;p id=&quot;dUBw&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;. High-performance computing power&lt;/p&gt;
  &lt;p id=&quot;KM2O&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;. Payment for AI and GPU services&lt;/p&gt;
  &lt;p id=&quot;JLgj&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;. 5&lt;/p&gt;
  &lt;p id=&quot;2hyD&quot;&gt;&lt;strong&gt;Quiz:&lt;a href=&quot;https://skynet.certik.com/quest/mintlayer-build-on-bitcoin?referralId=4936999137834924636&quot; target=&quot;_blank&quot;&gt;Mintlayer | Build on Bitcoin&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;ZUY3&quot;&gt;&lt;strong&gt;1.&lt;/strong&gt;To improve direct token interoperability with Bitcoin&lt;/p&gt;
  &lt;p id=&quot;NDO4&quot;&gt;&lt;strong&gt;2&lt;/strong&gt;.By providing a built-in DEX for P2P transfers&lt;/p&gt;
  &lt;p id=&quot;VruE&quot;&gt;&lt;strong&gt;3&lt;/strong&gt;.Both fungible and non-fungible tokens&lt;/p&gt;
  &lt;p id=&quot;V5wH&quot;&gt;&lt;strong&gt;4&lt;/strong&gt;. enable users to participate in the block signer auction and earn rewards&lt;/p&gt;
  &lt;p id=&quot;pDfk&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;EE75&quot;&gt;&lt;/p&gt;
  &lt;p id=&quot;2tUL&quot;&gt;&lt;strong&gt;P.S. Your opinion is important! If you liked the article or have any comments, feel free to leave a reaction below. &lt;a href=&quot;https://t.me/retroflowx&quot; target=&quot;_blank&quot;&gt;Telegram&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</content></entry></feed>