Why I Created this Course
With the recent chaos and more
investors, crypto scams are
exploding with frequency and
sophistication. We, the people
are the weakest links when it
comes to getting scammed. The
first video of this course will show
you how we are being attacked.
The second video will show you the precautions to take,
your state of mind, and questions to ask yourselves.
Don’t be the
sucker!
Once we are scammed
of crypto, we rarely
get it back because of
immutable
transactions.
“They said I would get thousands of
coins if I just sent them a couple
hundred…”
Routes of Attacks
● Fake accounts / hacked social media accounts.
● Paid ads that look and sound official.
● Imposter websites (check https, spelling, official
accounts)
● Fake apps, android is more susceptible.
● Email scams
● Blackmail scams (control of computer / accounts, etc.)
Different Scams and Schemes
Official account
gets hacked
You trust it, send
some crypto and
lose it or send
data that you
should not send
Messages sent
for giveaways
and contests
Fake official
accounts created
You are sent an
official looking
email
You see an ad on
a major site for a
giveaway
It takes you to an
official looking
offer page / site.
You see a new
exchange and
sign up
There is a flashy
new ICO / coin
offer available
You use an
official looking
phone app
Crypto Giveaway Scams
Scammers use giveaways and contests to try to get you
to send them crypto or reveal sensitive details. Never
transfer your crypto for these reasons! It will be lost.
Go to the source. Research the home pages and official
social accounts for whatever coin is being offered. The
scammers want your emails, phone numbers, banking
info, and private crypto keys as well. Keep your info to
yourself.
Scam Promises and Messages
● Send us crypto to get even more (double it)
● This new startup / ICO will return 5X your investment.
● We just need your private key / seed phrases.
● We’ll send you an email and you just click the link.
● A brand new state of the art exchange
● Free crypto / money for signing up
● Time is running out on this offer (rushing you).
● Invite your friends for this deal (ponzis / pyramids).
How to Protect Yourself
Always Research Offers!
Since we are the weakest link for getting scammed, we
need to be cautious of every offer we see. Always be
distrustful as a first instinct.
Search to see if others have been scammed with the offer
being presented to you. Go to the official sites and social
accounts for the offer sources. Let your research from all
these angles show you that it is legit. Don’t take their
word for it.
Don’t Trust any Ads
Scammers are having their paid ads served to us on
massive sites we use. We can speculate as to why they
are reaching us on Google, Facebook, Youtube, etc. The
“why” doesn’t matter. Just know they are there.
The point is that we can’t trust ads just because they are
on a large platform that we use. They target your search
behavior, related videos, post, and pages. Always be
skeptical about giveaways and those asking for info and
crypto.
Private Keys are Private!
Never give out your private keys or secret phrases to
anyone! Hardware wallets are vital since they keep your
private keys offline forever.
In my view, any private key that is online is vulnerable.
An exchange holding your crypto is not completely yours.
“Not your keys, not your coins!” (Keep your coins off
exchanges when you are done with them.)
Use Anti-Virus / Linux
Malware and other viruses seek out
your private information in order to
steal your identity, money, and
crypto.
A good anti-virus for your phone, tablet and computer is a
must have. Linux OS is another suggestion. This is another
layer of protection against beinig a victim.
Use Two Factor Authentication
Two factor authentication (2FA) is another requirement in
the crypto space, in my opinion. This is when you are
logging in and you are texted a code or you use an app
that gives a rotating code to enter.
Scammers will try to get you to enter your code. But, you
need to keep it secret and use it with official sites.
Secure your Browsing
Anti-virus and privacy browsers (Firefox, Brave) should be
used all the time. The MetaMask add-on / extension also
blacklists counterfeit crypto sites.
An extra step in protection is a VPN (Virtual Private
Network). These keep your identity anonymous online.
They can help secure your data and keep prying eyes off
of it, including large tech corporations.
Don’t Allow Remote Access
Some scammers will get you to call or chat with them. In
addition to asking for personal information or to send
crypto, they might try to get remote access to your
computer.
Never allow it! This should never have to be done with
crypto. They are looking to steal your money and details.
Report Scammers!
Reporting scams to the platforms where they are
happening. Those sights don’t want them on there since
it compromises their business reputation and users.
In the US, you can report to ftc.gov/complaint and others.
When more people report these crimes, more attention
will be given to them.
Conclusion
You must take responsibility for your crypto and protect
it! Now you know the scams to watch out for and how to
defend against them.
We are the last line of defense. If an offer is too good to
be true, avoid it! Always stick to the basics of not
providing personal information unless you have
thoroughly researched it. NEVER give out private keys or
seed keyword phrases.

More Related Content

PDF
Bitis Hunter - Map your vietnam - Marketing Arena 2016
PDF
Young Marketers 5+1 + Đặng Quang Minh
PPTX
Thống kê Hành vi Xem Truyền Hình của Người Việt nam
PDF
Young Marketers 7 + BÙI HUY HOÀNG
PDF
Giai golf doanh nhan quoc te 2021 fab
PPTX
Vietnamese behaviors in watching movies
PDF
Booklet UFLL 2020
PDF
Vietnam Mobile Marketing and Game 2019 (English new)
Bitis Hunter - Map your vietnam - Marketing Arena 2016
Young Marketers 5+1 + Đặng Quang Minh
Thống kê Hành vi Xem Truyền Hình của Người Việt nam
Young Marketers 7 + BÙI HUY HOÀNG
Giai golf doanh nhan quoc te 2021 fab
Vietnamese behaviors in watching movies
Booklet UFLL 2020
Vietnam Mobile Marketing and Game 2019 (English new)

What's hot (20)

PPTX
Smartphone usage in Vietnam
PDF
YOUNG MARKETERS 5+1 - FINALE - NGUYỄN THÁI PHONG
PDF
YOUNG MARKETERS 5+1 - FINALE - TRẦN HOÀNG DƯƠNG
PDF
[Marketing Arena 2021][TikTok] - TikTak Team
PDF
Young Marketers 10 - Final Report - Nguyễn Thị Xuân
PDF
Young Marketers 9 - Cao Nhã Đình
PPTX
Marketing Arena 2019 Finale - 3CE Team
PPTX
Young Marketers 5+1 + Nguyễn Tuấn Anh
PPTX
"Reality show" popularity in Vietnam
PDF
Nguyen Thanh Dat - Young Marketer Contest 9
DOCX
Debate script
PDF
Young Marketers 7 + Quách Thanh Hải
PDF
Young marketers elite 4 -Assignment Tet Campaign Insight - Quang Minh - Bảo N...
PDF
Những giá trị sống cho tuổi trẻ
PPTX
Side Job Trend in Vietnam
PDF
Nielsen - Vietnam retail landscape
PDF
Research of why Vietnamese put ice on beer
DOCX
Samsung script advertisement
PPTX
Young Marketers 5+1 Nguyễn Thái Phong
Smartphone usage in Vietnam
YOUNG MARKETERS 5+1 - FINALE - NGUYỄN THÁI PHONG
YOUNG MARKETERS 5+1 - FINALE - TRẦN HOÀNG DƯƠNG
[Marketing Arena 2021][TikTok] - TikTak Team
Young Marketers 10 - Final Report - Nguyễn Thị Xuân
Young Marketers 9 - Cao Nhã Đình
Marketing Arena 2019 Finale - 3CE Team
Young Marketers 5+1 + Nguyễn Tuấn Anh
"Reality show" popularity in Vietnam
Nguyen Thanh Dat - Young Marketer Contest 9
Debate script
Young Marketers 7 + Quách Thanh Hải
Young marketers elite 4 -Assignment Tet Campaign Insight - Quang Minh - Bảo N...
Những giá trị sống cho tuổi trẻ
Side Job Trend in Vietnam
Nielsen - Vietnam retail landscape
Research of why Vietnamese put ice on beer
Samsung script advertisement
Young Marketers 5+1 Nguyễn Thái Phong
Ad

Similar to How to Avoid Crypto Scams - Crypto JBro (20)

PDF
Unveiling the Threat How to Recognize and Report Crypto Scams
PPTX
Phishing
PPT
Users guide
PDF
Cryptocurrency Scams | How Do You Protect Yourself?
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PDF
Cybersecurity 101: Protecting Data, Accounts, and Digital Assets in a Connect...
PDF
Cybersecurity
PPTX
Phishing & spamming
PPTX
Seminar
PPTX
Cyber crime
PDF
Cyber Crime Awareness : Staying Safe in the Digital Age
PPTX
e-Security and malwares(virus, trojan and adware)
PPTX
The Major Types of Cybercrime
PPTX
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
PPTX
Identity theft
PPTX
Phishing technology
PPTX
Phishing technology
PDF
Security Primer
PPTX
Phishing technology
Unveiling the Threat How to Recognize and Report Crypto Scams
Phishing
Users guide
Cryptocurrency Scams | How Do You Protect Yourself?
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Cybersecurity 101: Protecting Data, Accounts, and Digital Assets in a Connect...
Cybersecurity
Phishing & spamming
Seminar
Cyber crime
Cyber Crime Awareness : Staying Safe in the Digital Age
e-Security and malwares(virus, trojan and adware)
The Major Types of Cybercrime
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Identity theft
Phishing technology
Phishing technology
Security Primer
Phishing technology
Ad

More from Jared Broker (9)

PDF
Decentralized Exchange Aggregators Explained
PDF
How to Research the Teams Behind a Cryptocurrency
PDF
How to Research new Cryptocurrencies - Checklist Questions
PPTX
Synthetix Network (SNX) Overview
PPTX
Orchid (OXT) Crypto Explained - P2P Decentralized VPN
PPTX
Staking Cryptocurrency Explained (with Platform List)
PPTX
Bitcoin vs Bitcion Cash vs Bitcoin SV
PPTX
Tezos Cryptocurrency Explained (Fast and Simple)
PPTX
Holochain (HOT) Explained
Decentralized Exchange Aggregators Explained
How to Research the Teams Behind a Cryptocurrency
How to Research new Cryptocurrencies - Checklist Questions
Synthetix Network (SNX) Overview
Orchid (OXT) Crypto Explained - P2P Decentralized VPN
Staking Cryptocurrency Explained (with Platform List)
Bitcoin vs Bitcion Cash vs Bitcoin SV
Tezos Cryptocurrency Explained (Fast and Simple)
Holochain (HOT) Explained

Recently uploaded (20)

PDF
GVCParticipation_Automation_Climate_India
PDF
Fintech Regulatory Sandbox: Lessons Learned and Future Prospects
PDF
Statistics for Management and Economics Keller 10th Edition by Gerald Keller ...
PPTX
Q1 PE AND HEALTH 5 WEEK 5 DAY 1 powerpoint template
PDF
01 KEY PROVISIONS on NGPA and PROFESSIONALIZATION.pdf
PDF
2018_Simulating Hedge Fund Strategies Generalising Fund Performance Presentat...
PDF
Pitch Deck.pdf .pdf all about finance in
PDF
Lundin Gold Corporate Presentation August 2025
PDF
USS pension Report and Accounts 2025.pdf
PPT
features and equilibrium under MONOPOLY 17.11.20.ppt
PDF
2012_The dark side of valuation a jedi guide to valuing difficult to value co...
DOCX
Final. 150 minutes exercise agrumentative Essay
PPTX
INDIAN FINANCIAL SYSTEM (Financial institutions, Financial Markets & Services)
PDF
Truxton Capital: Middle Market Quarterly Review - August 2025
PPTX
Group Presentation Development Econ and Envi..pptx
PPTX
2. RBI.pptx202029291023i38039013i92292992
PPTX
Machine Learning (ML) is a branch of Artificial Intelligence (AI)
PDF
Pension Trustee Training (1).pdf From Salih Shah
PPTX
Module5_Session1 (mlzrkfbbbbbbbbbbbz1).pptx
PPTX
PROFITS AND GAINS OF BUSINESS OR PROFESSION 2024.pptx
GVCParticipation_Automation_Climate_India
Fintech Regulatory Sandbox: Lessons Learned and Future Prospects
Statistics for Management and Economics Keller 10th Edition by Gerald Keller ...
Q1 PE AND HEALTH 5 WEEK 5 DAY 1 powerpoint template
01 KEY PROVISIONS on NGPA and PROFESSIONALIZATION.pdf
2018_Simulating Hedge Fund Strategies Generalising Fund Performance Presentat...
Pitch Deck.pdf .pdf all about finance in
Lundin Gold Corporate Presentation August 2025
USS pension Report and Accounts 2025.pdf
features and equilibrium under MONOPOLY 17.11.20.ppt
2012_The dark side of valuation a jedi guide to valuing difficult to value co...
Final. 150 minutes exercise agrumentative Essay
INDIAN FINANCIAL SYSTEM (Financial institutions, Financial Markets & Services)
Truxton Capital: Middle Market Quarterly Review - August 2025
Group Presentation Development Econ and Envi..pptx
2. RBI.pptx202029291023i38039013i92292992
Machine Learning (ML) is a branch of Artificial Intelligence (AI)
Pension Trustee Training (1).pdf From Salih Shah
Module5_Session1 (mlzrkfbbbbbbbbbbbz1).pptx
PROFITS AND GAINS OF BUSINESS OR PROFESSION 2024.pptx

How to Avoid Crypto Scams - Crypto JBro

  • 1. Why I Created this Course With the recent chaos and more investors, crypto scams are exploding with frequency and sophistication. We, the people are the weakest links when it comes to getting scammed. The first video of this course will show you how we are being attacked. The second video will show you the precautions to take, your state of mind, and questions to ask yourselves.
  • 2. Don’t be the sucker! Once we are scammed of crypto, we rarely get it back because of immutable transactions. “They said I would get thousands of coins if I just sent them a couple hundred…”
  • 3. Routes of Attacks ● Fake accounts / hacked social media accounts. ● Paid ads that look and sound official. ● Imposter websites (check https, spelling, official accounts) ● Fake apps, android is more susceptible. ● Email scams ● Blackmail scams (control of computer / accounts, etc.)
  • 4. Different Scams and Schemes Official account gets hacked You trust it, send some crypto and lose it or send data that you should not send Messages sent for giveaways and contests Fake official accounts created You are sent an official looking email You see an ad on a major site for a giveaway It takes you to an official looking offer page / site. You see a new exchange and sign up There is a flashy new ICO / coin offer available You use an official looking phone app
  • 5. Crypto Giveaway Scams Scammers use giveaways and contests to try to get you to send them crypto or reveal sensitive details. Never transfer your crypto for these reasons! It will be lost. Go to the source. Research the home pages and official social accounts for whatever coin is being offered. The scammers want your emails, phone numbers, banking info, and private crypto keys as well. Keep your info to yourself.
  • 6. Scam Promises and Messages ● Send us crypto to get even more (double it) ● This new startup / ICO will return 5X your investment. ● We just need your private key / seed phrases. ● We’ll send you an email and you just click the link. ● A brand new state of the art exchange ● Free crypto / money for signing up ● Time is running out on this offer (rushing you). ● Invite your friends for this deal (ponzis / pyramids).
  • 7. How to Protect Yourself
  • 8. Always Research Offers! Since we are the weakest link for getting scammed, we need to be cautious of every offer we see. Always be distrustful as a first instinct. Search to see if others have been scammed with the offer being presented to you. Go to the official sites and social accounts for the offer sources. Let your research from all these angles show you that it is legit. Don’t take their word for it.
  • 9. Don’t Trust any Ads Scammers are having their paid ads served to us on massive sites we use. We can speculate as to why they are reaching us on Google, Facebook, Youtube, etc. The “why” doesn’t matter. Just know they are there. The point is that we can’t trust ads just because they are on a large platform that we use. They target your search behavior, related videos, post, and pages. Always be skeptical about giveaways and those asking for info and crypto.
  • 10. Private Keys are Private! Never give out your private keys or secret phrases to anyone! Hardware wallets are vital since they keep your private keys offline forever. In my view, any private key that is online is vulnerable. An exchange holding your crypto is not completely yours. “Not your keys, not your coins!” (Keep your coins off exchanges when you are done with them.)
  • 11. Use Anti-Virus / Linux Malware and other viruses seek out your private information in order to steal your identity, money, and crypto. A good anti-virus for your phone, tablet and computer is a must have. Linux OS is another suggestion. This is another layer of protection against beinig a victim.
  • 12. Use Two Factor Authentication Two factor authentication (2FA) is another requirement in the crypto space, in my opinion. This is when you are logging in and you are texted a code or you use an app that gives a rotating code to enter. Scammers will try to get you to enter your code. But, you need to keep it secret and use it with official sites.
  • 13. Secure your Browsing Anti-virus and privacy browsers (Firefox, Brave) should be used all the time. The MetaMask add-on / extension also blacklists counterfeit crypto sites. An extra step in protection is a VPN (Virtual Private Network). These keep your identity anonymous online. They can help secure your data and keep prying eyes off of it, including large tech corporations.
  • 14. Don’t Allow Remote Access Some scammers will get you to call or chat with them. In addition to asking for personal information or to send crypto, they might try to get remote access to your computer. Never allow it! This should never have to be done with crypto. They are looking to steal your money and details.
  • 15. Report Scammers! Reporting scams to the platforms where they are happening. Those sights don’t want them on there since it compromises their business reputation and users. In the US, you can report to ftc.gov/complaint and others. When more people report these crimes, more attention will be given to them.
  • 16. Conclusion You must take responsibility for your crypto and protect it! Now you know the scams to watch out for and how to defend against them. We are the last line of defense. If an offer is too good to be true, avoid it! Always stick to the basics of not providing personal information unless you have thoroughly researched it. NEVER give out private keys or seed keyword phrases.