All
FAQ
Announcements
Product documents
How do I protect my account from Trojan horse takeovers?
Risky file types include .exe, .zip, .docm, and .xlsm. Cracked Software and Illegal Downloads Free and unauthorized software activators, game cheats, or pirated media often contain embedded Trojans. These are widely circulated on file-sharing platforms and pose significant security risks to your device. Malicious Websites and Pop-ups Simply visiting a compromised website or clicking on deceptive pop-up ads may trigger an automatic malware download. This is known as a drive-by download.Published on May 30, 2025Updated on Feb 5, 2026FAQ11How do I verify OKX's ownership and balance of the wallet address?
Open the verification tool, select the zip file to download You can see the following two tools in the folder: VerifyAddress: verify ownership of reserve address. CheckBalance: verify reserves address balance (Note: rpc.json needs to be configured, in order to configure node RPC or OKLink open API and other related information.) You can see VerifyAddress and CheckBalance in the folder 2. Open the audit files and download the Proof of Reserves 3.Published on Sep 26, 2023Updated on Jan 26, 2026FAQ996
Showing 1-2 of 2 articles