Transaction Safety | Helium Documentation (2024)

Helium is built on top of Solana, a general-purpose blockchain. Because Helium is built on Solana,there are many things you can do with your wallet both inside and outside of the Helium ecosystem.With this freedom, it is important to understand a few points to keep your tokens safe.

An account is entirely your own. No third party – including Helium – can recover or access anaccount. As such, it is critical that the 12 or 24-word seed phrase be stored in a secure mannerand must never be shared. Taking and storing screenshots of the seed words is not recommended,as it is not a secure way to store them. Screenshots and photos stored or backed up in the cloud arean easy target for attackers, leading to funds being stolen.

The point cannot be emphasized enough: Securely store and never share the 12 or 24-word seedphrase.

In addition to protecting the seed phrase, it is also important to understand where scammers maytake advantage of on-chain transactions to steal tokens. This article serves as an interactivequickstart on Solana transactions, and how to make sure you're staying safe!

Was my wallet compromised?

There are only two ways a wallet on Solana can be compromised.

  1. Someone gained access to your 12 or 24-word seed phrase.
  2. You approved a malicious transaction.

If neither (1) or (2) happened, your wallet is safe. Some examples:

An NFT appeared in my wallet and I visited the site listed. Am I compromised?
No, simply visiting a website is not enough to compromise your wallet.

I took a screenshot of my seed phrase and stored it in iCloud. My iCloud was hacked.
Yes. You have been compromised.

Helium Support contacted me and said I needed to give them my seed phrase to fix my Hotspot. Igave it to them or entered the phrase into the support site.
Yes. You have been compromised. Nobody from Helium will EVER ask you for your seed phrase. It isnever needed to diagnose or fix an issue.

A website failed to connect to my wallet and said I needed to manually connect my wallet with myseed phrase. I input the seed phrase.
Yes. You have been compromised. No website should EVER ask you for your seed phrase.

An NFT appeared in my wallet claiming I had free tokens to claim. I went to the website, clickedthe claim button, and clicked approve.
Yes. You may have been compromised by approving a bad transaction.

What is a bad transaction? How can you tell if a transaction is suspicious? In general, you shouldnever sign a transaction from an app you do not trust. When in doubt, do not sign.

This page will serve as a guide to help you identify suspicious transactions.

The Basics

What is a Transaction?

A transaction refers to a set of instructions that are executed on the Solana blockchain. A Solanatransaction typically includes a sequence of operations or instructions that modify the state of theblockchain. These operations can involve transferring tokens, executing smart contracts, orinteracting with decentralized applications (dApps).

What is an Account?

In the context of Solana, an account refers to a data structure that holds information on the stateof a particular entity on the blockchain. Accounts in Solana are fundamental components that storedata, tokens, or program code.

If you hold HNT tokens, those tokens are in an Account that is tied to your wallet.

Anatomy of a Solana Transaction

A Solana transaction is made up of

  1. Accounts - Pieces of state on Solana

    a. Read-only Accounts - Accounts that are used during a transaction, but cannot be changed.

    b. Writable Accounts - Accounts that can change during a transaction. For example, if your USDCaccount is writable, it can send (or receive) tokens in this transaction

  2. Instructions - A set of actions to make changes to Accounts. Examples include transfers, orclaiming rewards on a Helium hotspot.

  3. Signers - A set of Wallets that must agree to this transaction for it to be valid

Accounts are generally tied to particular wallets - this means that only that wallet can makechanges to the Account. For example, if you hold $HNT, only your wallet can send those tokens. Thisis why it is important to never give out your seed phrase and never sign a transaction youdon't trust.

Transaction Previews

Most wallets, including the Helium Wallet App, come with a transaction preview. To follow this guideon Helium Wallet, open the wallet app and navigate to this page using the DApp Browser (globe iconon the far right).

These previews use a Solana feature called simulation. On Solana, simulation allows you tosimulate what a transaction will change without actually executing the transaction. Thesesimulations can be useful for estimating changes to your wallet, such as changes in token balance.

It is important to note that simulations can be manipulated by scammers. As such, never take asimulation as gospel.

Want to see a transaction preview in your wallet? Click the button below and it will create atransaction to send 0.01 SOL.

Note that none of the transactions on this page will actually be sent.


You should see the following:

Transaction Safety | Helium Documentation (1)

Here we can see a few things. First, 2 accounts are writable in this transaction. The first isyour sol account, the second is the destination sol account. Second, you can see the total networkfee (denominated in SOL) that you will pay to run this transaction.

How will this transaction change your SOL Balance?

Reveal

While it is estimated that you will send 0.010005 SOL in this transaction, the transcationcould send away all of your SOL. This is only a simulation, the actual changes may differ. Asalways, be sure you trust any application you approve transactions from within.

How will this transaction change your HNT Balance?

Reveal

Your HNT balance can not change from this transaction, because your HNT account is notlabeled as writable. The only accounts at risk in a transaction are the ones that arewritable

Common Attacks

Now that you are familiar with Solana transactions, and their previews, lets go through someexamples of suspicious transactions.

Generally, these transactions will come under the guise of another function. An attacker may claimthis transaction will give you free tokens, mint an NFT, or even repair your hotspot. The attackeris lying. If anyone tells you to ignore the transaction preview warnings, they are suspicious.

The Obvious Drainer

The following transaction(s) will attempt to drain all of your token accounts:


You should see a preview like this:

Transaction Safety | Helium Documentation (2)

Given this preview, it is pretty obvious that all your token accounts are getting drained. Not onlyare they all labeled as writable, the simulation shows that all tokens are getting sent away!

You should never approve a transaction that looks like this.

The Bitflip Drainer

The above drainer was obvious because the simulation showed all tokens leaving your account.

But what if the simulation didn't show any account changes? In a bitflip attack, an attacker createsa program on-chain that has a remote-enabled switch to rug you. The attacker waits until after youapprove the transaction to flip the switch. What does one of these look like in preview?


You should see a preview like this. Note that we did not create a bitflip program, this is just whatit would look like in preview:

Transaction Safety | Helium Documentation (3)

Given this preview, it's not clear that you are getting rugged. Your accounts are labeled aswritable, but they do not change in simulation.

An attacker may mix such a transaction with other accounts as a smoke-screen. Remember any accountthat is writable is at risk of getting drained.

Simulation Failed

Another common tactic of drainers is to just fail the simulation. If you can't see what changes, youcan't make an educated decision. Generally, these attackers will have some text on the websitetelling you to ignore failed transaction simulations. This is a lie. Do not approve thesetransactions


You should see a preview like this:

Transaction Safety | Helium Documentation (4)

The Smoke Screen

Not every transaction you approve will be executed. In a smoke screen attack, the attacker createsmultiple transactions, the sum of which is a positive outcome.

In this attack, you may see that you sent all of your $HNT to the attacker. But you may also seeanother transaction that's sending you $1,000,000 $USDC. Or some "free" airdrop. You figure that itsworth losing the HNT for the USDC. The site could also be convincing you that this is a legitimateswap of some sort.

The transaction may look something like this:


You should see a preview like this:

Transaction Safety | Helium Documentation (5)

This looks appealing. After all, the simulation is telling you you'll get $1,000,000 and all youhave to do is send 0.01 SOL! As always, if it seems too good to be true, it is. If you approve atransaction like this, the attacker will only send the transactions where you give them funds.

The Slow Rug

Did you know that if you approve a malicious transaction, it may not take all of your funds at thatmoment?

Some attacks compromise your wallet, and then lay in wait until more funds are transferred into thewallet. Imagine you signed a suspicious transaction to mint an NFT, but then you got the NFT.Everything is good, right? Wrong. Later on, you transfer $50,000 USDC into this wallet, and itimmediately disappears. This actually happened to someone. How can this happen?

Solana token accounts have an ability called delegation. Think of delegation as a way to giveanother wallet permissions to withdraw a set amount of tokens from your wallet. This is generallyused for subscription services and escrowless NFT listing. An attacker will use this feature to givethemselves unlimited delegation on your account. They then wait until you transfer in more funds,and steal them.

You'll need to hold HNT for this to work. The transaction may look something like this:


You should see a preview like this:

Transaction Safety | Helium Documentation (6)

Note that typically this attack is combined with a smoke screen. The attacker will have multipletransactions, or disguise this transaction to look like a legitimate transaction. This attack canalso be combined with a bitflip attack so you do not see "Withdraw Authority Given" in thesimulation. As always, be careful about what you sign.

The Owner Change

Similar to the slow rug, malicious actors can change the owner of your token account. This givesthem full permission to withdraw your tokens, and removes your ability to withdraw your tokens. Oncethe owner is changed, the token account is theirs.

You'll need to hold HNT for this to work. The transaction may look something like this:


You should see a preview like this:

Transaction Safety | Helium Documentation (7)

Note that typically this attack is combined with a smoke screen. The attacker will have multipletransactions, or disguise this transaction to look like a legitimate transaction. This attack canalso be combined with a bitflip attack so you do not see "Owner Change" in the simulation. Asalways, be careful about what you sign.

Fake Token/Mint

Attack sites will try to make the transaction preview look like it is giving you what you expect.

For example, an attacker may claim to be giving out free $JUP. When you see the transaction preview,it says you are receiving $JUP. But is it actually $JUP?

On Solana, token names and symbols are not unique. Anybody can create a token that is aduplicate of another token. If you are unsure, verify the public key of the token you are receiving.

Address Poisoning

You are trying to send your SOL to an exchange like Coinbase. Imagine the following workflow

  1. You send 0.01 SOL as a test to the address Coinbase specified
  2. You verify it arrived in Coinbase
  3. You go into your transaction history and copy the succesful Coinbase address
  4. You send the remaining 100 SOL to Coinbase
  5. It never arrives.

What happened? This attack is called dusting. Notice in step 3 you copied an address from yourtransaction history. There was a hidden step 2.5. The scammer sent you a transaction from an addressthat looks exactly like the Coinbase address -- the first 4 and last 4 characters of the public keyare the same! When you went into your transaction history and clicked the first transaction, it wasthe scammer's dust transaction. NOT your testing transaction.

To avoid this attack, always copy addresses directly from the exchange, and never from yourtransaction history.

Where do Scams Come From?

Scammers will try to find any way to get your attention. Some common ways include:

  • Discord DMs
  • Twitter replies
  • Sending you NFTs with a link attached
  • Sending you Tokens with a link attached
  • Sending you a small amount of SOL from a domain that takes you to a link
  • Texting you
  • Pretending to be support
  • Pretending to be a reporter

Generally, trust no one. Always verify who you are talking to, and never approve transactions for awebsite you just discovered. You wouldn't give out your bank account password, so never give outyour seed phrase.

My wallet is compromised, now what?

As seen above, an attack can do more than just drain your wallet. It can leave landmines that awaitfuture funds to steal those as well.

Because of this, if your wallet is compromised, create a new wallet with a new seed phrase.

Hot/Cold Wallet

These attacks may seem scary, but there is a way to limit their blast radius. When you walk aroundin the real world, do you carry the entire contents of your bank account in your wallet? Of coursenot!

You keep enough money for a few days in your wallet, and not more. Crypto is no different.

A hot wallet is a wallet you use for daily interactions. Do not keep more in this wallet thanyou are willing to lose.

A cold wallet is a wallet you use for storing funds. With few exceptions, this wallet shouldonly be used for transactions within your wallet of choice. It should never interact withapplications.

Treat your cold wallet like a savings account. For an added layer of safety, you can make your coldwallet a hardware wallet (Ledger, Trezor, Keystone, Ryder, etc). You can also use a multisig likeSquads.

Recognizing Illegitimate Actors

Additionally, beware of lookalike websites or apps seeking to offer help, support, airdrops, orother features. Do not share private keys or authenticate transactions through untrusted platforms.

Transaction Safety | Helium Documentation (8)

Transaction Safety | Helium Documentation (2024)

FAQs

Transaction Safety | Helium Documentation? ›

With few exceptions, this wallet should only be used for transactions within your wallet of choice. It should never interact with applications. Treat your cold wallet like a savings account. For an added layer of safety, you can make your cold wallet a hardware wallet (Ledger, Trezor, Keystone, Ryder, etc).

What is transaction safety? ›

Transaction security, also known as payment security, refers to a category of practices, protocols, tools and other security measures used during and after business transactions to protect sensitive information and ensure the safe and secure transfer of customer data.

What is the public key of helium hotspot? ›

Public Key​

The public key is your 'calling card' on the blockchain. Anyone with it can view token balances, Hotspots, and any associated history of these entities. The public key is the address that can be shared. For purposes of security, the public key cannot be used to determine the private key.

How do I know if a transaction is safe? ›

To ascertain the security of a payment platform, it's important to look out for the following indicators:
  1. SSL Certificates. ...
  2. PCI-DSS Compliance. ...
  3. Two-Factor Authentication (2FA) ...
  4. Regular Security Audits. ...
  5. Transparent Privacy Policies. ...
  6. User Reviews and Reputation. ...
  7. Industry Certifications / Endorsem*nts. ...
  8. Support and Response.

How secure is a helium hotspot? ›

Authentication to the Helium Mobile Wi-Fi network occurs using Passpoint 2.0, where each authorized device must present a certificate. No password is used for authentication, which means no password to brute-force! In addition, all traffic is linked to specific devices and subscribers.

Can anyone connect to a helium hotspot? ›

Helium Mobile Wi-Fi is a new feature that provides additional functionality for Helium Mobile Hotspots by offering connectivity for everyone, even if they are not Helium Mobile subscribers yet.

How does helium hotspot make money? ›

By mining and expanding The People's Network's coverage with suitable hotspots, miners gain HNT. The reward amount is correlated with the data a miner will transfer — i.e., more money when miners transfer more device data.

What is the meaning of transaction security? ›

Transaction security ensures that users that attempt to run a transaction are entitled to do so. You might come across the alternative terms of attach-time security or transaction-attach security to describe transaction security.

What is transaction risk in simple terms? ›

Transaction risk is the risk faced by a company when making financial transactions between jurisdictions. The risk is the change in the exchange rate before transaction settlement. Essentially, the time delay between transaction and settlement is the source of transaction risk.

What does it mean to secure a transaction? ›

A secured transaction is an arrangement in which a buyer or borrower (referred to as the debtor) guarantees payment of an obligation by granting a security interest in property to the seller or lender (referred to as the secured party). The property in which the security interest exists is called collateral.

What is an example of a secure transaction? ›

Some common types of secured transactions include mortgage and car loans. When a debtor borrows money to purchase a car, the vehicle is the collateral for the loan. The creditor has a security interest in the vehicle and the creditor can repossess and sell the car if payments are not made.

Top Articles
With Credit Suisse Investors The Latest To See Massive Losses, Are More Bank Failures To Come?
The Cryptocurrency Battle Continues Between Bitcoin And Bitcoin Cash For Number One Spot
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6716

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.