Verify humans and contracts
Bookmark official sites, triple-check token addresses, and reject “urgent” DMs promising guaranteed yields.
Self-custody discipline
Hardware wallets, multisig, and seed phrase storage drills beat screenshots in cloud albums.
When things go wrong
Report to exchanges, chain analytics firms, and local cyber units quickly—provenance tooling sometimes freezes stolen funds.