Tutorials:Web3 Introduction: Difference between revisions

From Seasonal Tokens
Jump to navigation Jump to search
No edit summary
No edit summary
Line 26: Line 26:
The Master private key is characterized by a set of twelve words, called the seed, that are enough to recreate all your private keys. If you have your 12 words you can install a wallet software anywhere and load your private keys to access your coins.
The Master private key is characterized by a set of twelve words, called the seed, that are enough to recreate all your private keys. If you have your 12 words you can install a wallet software anywhere and load your private keys to access your coins.


The number of possible 12 word combinations is very large. The probability of finding a Master private key this way is comparable to the probability of finding X
=How Secure is the Seed?=


Breaking a modern Bitcoin/Ethereum seed phrase by brute force is computationally hopeless because of the number of possible seeds is astronomically large. Even if an attacker had unrealistically massive hardware that could test trillions of seeds per second, the expected time to hit the right 12-word seed would still be around 10¹⁹ years, vastly longer than the age of the universe.
Breaking a modern Bitcoin/Ethereum seed phrase by brute force is computationally hopeless because of the number of possible seeds is astronomically large. Even if an attacker had unrealistically massive hardware that could test trillions of seeds per second, the expected time to hit the right 12-word seed would still be around 10¹⁹ years, vastly longer than the age of the universe.
Line 46: Line 46:
A direct attack by hackers to the blockchain is nearly impossible at this stage. There are public bitcoin addresses with thousands of Bitcoins that remain untouched for years. The weak point in security is keeping the private keys safe.  
A direct attack by hackers to the blockchain is nearly impossible at this stage. There are public bitcoin addresses with thousands of Bitcoins that remain untouched for years. The weak point in security is keeping the private keys safe.  


We will list some of the dangers you have to avoid
We will list some of the dangers you have to avoid:


The most common and dangerous issue is loosing your wallet seed.
Seed phrase exposure (the #1 risk): screenshots, cloud notes, email drafts, password managers you don’t fully trust, printers, clipboard history, or anyone seeing it even once.
Spyware finds your wallet password and funds are moved when you connect your wallet.


=Seasonal Tokens Overview=
Phishing & fake sites: “wallet connect”, airdrops, support DMs, Google ads, and look-alike domains that trick you into typing your seed or signing something.


We will use Seasonal Tokens as an example because its four smart contracts form a self-contained ecosystem that can be studied independently from external market conditions, by paying attention to the price of the tokens relative to each other, and not measured in Ether or USD.
Malware / keyloggers: cracked software, shady browser extensions, “PDF invoices,” remote-access trojans—anything that can read your screen/keyboard or swap copy-pasted addresses.


It is an innovative experiment in cryptocurrency technology, where the four tokens apply the economic principles of Bitcoin’s design:
Fake wallet apps / malicious updates: downloading wallets from unofficial links, or installing “updates” pushed through Telegram/Discord.


# Digital commodities produced by Proof of Work mining,
Malicious browser extensions: especially “helper” crypto tools that request broad permissions; some drain wallets by altering transactions.
# Limited total supply.
# Decreasing rates of production
# Regular Halvings
# No governance, totally trust-less and decentralized
# No Initial Coin Offerings, pre mining or any advantage to developers.


Blind signing approvals: signing a transaction you don’t understand (or that your wallet can’t clearly decode), especially on Ethereum where signatures can grant spending rights.


However, instead of using four separate blockchains, they operate within the Ethereum Virtual Machine.
Unlimited token allowances: approving a dApp to spend unlimited ERC-20 tokens, then the dApp (or a compromised contract) drains later.
This setup provides a fully closed ecosystem where users can gain hands-on experience in a relatively low-risk environment.


Wrong network / wrong address copy-paste: sending funds to the wrong chain, wrong address type, or a contract that can’t receive them; also clipboard “address swapping.”


'''Four [https://www.investopedia.com/news/what-erc20-and-what-does-it-mean-ethereum/ ERC-20] Token Smart Contracts:'''
Fake tokens & impersonation: scam tokens with the same ticker/name, spoofed “verified” accounts, and fake liquidity pools.


Social engineering: “support” staff, “admins,” or “friends” asking for your seed, remote access, or “verification” transactions.


* Spring, Summer, Autumn and Winter.
SIM swap / weak 2FA: relying on SMS for exchange security; attackers port your number and reset passwords.
* Proof of Work mined on the Ethereum Network.
* Maximum Supply 37 million tokens of each type.
* Halving of Mining Supply every 3 years.


[[File:Implemented ETH.jpg|400px |left ]]
Exchange account compromise: reused passwords, no hardware 2FA, leaked email access, API keys left enabled, or phishing that steals session cookies.


[[File:Operating on Polygon.jpg|400px]]
Poor backup practices: only one copy of your seed, storing it where fire/water/theft can destroy it, or telling “someone you trust” who later leaks it.


----
Physical theft / coercion: unsecured hardware wallets, showing your balances publicly, storing seed at home without considering burglary or personal safety.


Signing on a “dirty” device: managing funds on a PC you use for gaming/mods/torrents; mixing high-risk browsing with high-value wallets.


The four tokens smart contracts are independent, they do not interact with each other, and they are identical, except for 3 things:
Complacency with hot wallets: keeping long-term savings in a browser wallet instead of cold storage; one bad click can be enough.
 
 
# The name
# Initial rate of supply
# The Halving schedule, arranged in time so that every nine months the fastest token to produce becomes the slowest to produce.
 
Seasonal Tokens are mined on the Ethereum network. The cost of electricity, equipment and gas fees establish a connection with the real world economy giving the tokens a basic cost of production.
 
However, operating in the Ethereum network is expensive, for this reason the Polygon network is used for trading at a minimal cost.
 
To learn more:
 
[https://welcome.seasonaltokens.org Welcome to Seasonal Tokens]

Revision as of 00:21, 8 January 2026

The term Web 3 refers to using the Internet to interact with cryptocurrencies.


Crypto 101

A cryptocurrency involves 3 components:

  • A computer network sharing a protocol for validating and updating a shared data structure called a Block-chain.
  • The Block-Chain, that keeps track of all transactions of the base digital assets.
  • And the digital assets themselves.Very special data structures that can be "owned" as physical objects do, often called coins, or tokens.

Although there are tens of thousands of cryptocurrencies, there are two basic design principles, exemplified by Bitcoin and Ethereum. Bitcoin was designed to be a decentralized peer to peer cash system, and Ethereum was designed as a decentralized virtual machine, expanding the idea of decentralization to computing itself.

Wallet

Only the network nodes interact directly with the blockchain. Most users interact via Internet using special software called a Wallet. Giving the impression that it is the place where you keep your coins, but it isn´t.

In crypto, the only thing you have is a private key, used to transfer the property of the coins from the address associated to the private key, to another address. The coins live in the blockchain, and you can loose your phone or computer, and no coins will be lost.

But if you loose your private keys there is no way to recover your coins.

The Wallet software does not hold or contain the coins, instead it contains a Master Private Key used to generate addresses (on Bitcoin) or accounts (on Ethereum), which are the places where you transfer the property to and from.

The Wallet Seed

The Master private key is characterized by a set of twelve words, called the seed, that are enough to recreate all your private keys. If you have your 12 words you can install a wallet software anywhere and load your private keys to access your coins.

How Secure is the Seed?

Breaking a modern Bitcoin/Ethereum seed phrase by brute force is computationally hopeless because of the number of possible seeds is astronomically large. Even if an attacker had unrealistically massive hardware that could test trillions of seeds per second, the expected time to hit the right 12-word seed would still be around 10¹⁹ years, vastly longer than the age of the universe.

In practice, successful “wallet hacks” almost never come from cracking the cryptography; they come from mistakes like weak passphrases, phishing, malware, leaked backups, or someone exposing their words.

The Most Important Safety Lesson In Crypto

All you really have is your twelve words. If you loose them, you loose everything.

Permissions

The wallet software is used to interact with websites. It handles the permissions and authorizations granted to the website over your coins.


More on Safety

A direct attack by hackers to the blockchain is nearly impossible at this stage. There are public bitcoin addresses with thousands of Bitcoins that remain untouched for years. The weak point in security is keeping the private keys safe.

We will list some of the dangers you have to avoid:

Seed phrase exposure (the #1 risk): screenshots, cloud notes, email drafts, password managers you don’t fully trust, printers, clipboard history, or anyone seeing it even once.

Phishing & fake sites: “wallet connect”, airdrops, support DMs, Google ads, and look-alike domains that trick you into typing your seed or signing something.

Malware / keyloggers: cracked software, shady browser extensions, “PDF invoices,” remote-access trojans—anything that can read your screen/keyboard or swap copy-pasted addresses.

Fake wallet apps / malicious updates: downloading wallets from unofficial links, or installing “updates” pushed through Telegram/Discord.

Malicious browser extensions: especially “helper” crypto tools that request broad permissions; some drain wallets by altering transactions.

Blind signing approvals: signing a transaction you don’t understand (or that your wallet can’t clearly decode), especially on Ethereum where signatures can grant spending rights.

Unlimited token allowances: approving a dApp to spend unlimited ERC-20 tokens, then the dApp (or a compromised contract) drains later.

Wrong network / wrong address copy-paste: sending funds to the wrong chain, wrong address type, or a contract that can’t receive them; also clipboard “address swapping.”

Fake tokens & impersonation: scam tokens with the same ticker/name, spoofed “verified” accounts, and fake liquidity pools.

Social engineering: “support” staff, “admins,” or “friends” asking for your seed, remote access, or “verification” transactions.

SIM swap / weak 2FA: relying on SMS for exchange security; attackers port your number and reset passwords.

Exchange account compromise: reused passwords, no hardware 2FA, leaked email access, API keys left enabled, or phishing that steals session cookies.

Poor backup practices: only one copy of your seed, storing it where fire/water/theft can destroy it, or telling “someone you trust” who later leaks it.

Physical theft / coercion: unsecured hardware wallets, showing your balances publicly, storing seed at home without considering burglary or personal safety.

Signing on a “dirty” device: managing funds on a PC you use for gaming/mods/torrents; mixing high-risk browsing with high-value wallets.

Complacency with hot wallets: keeping long-term savings in a browser wallet instead of cold storage; one bad click can be enough.