GridPlus
3.4K posts

GridPlus
@gridplus
The world's first secure touchscreen hardware wallet. Complete solutions for secure signing, key storage, and backups. Engineered and manufactured in the USA.




✨LUNAR NEW YEAR SALE IS LIVE 🧧 To celebrate new beginnings in the Year of the Fire Horse, we’re dropping a $100 discount on the Lattice1. 🎁 Each Lattice1 pack includes 3 free SafeCards. ⏳ 7 days only. Shop at gridplus.io. No code needed.





🚨 Security update: large-scale address poisoning + social engineering campaign targeting multisig users We’ve identified a coordinated effort by malicious actor(s) to create thousands of lookalike Safe addresses designed to trick users into sending funds to the wrong destination. This is social engineering combined with address poisoning. Important: this was not a protocol exploit, not an infrastructure breach, and not a smart contract vulnerability. That said, we take reports like this extremely seriously, because the end result is the same: users’ funds may be at risk. Etherscan reference (attacker factory used to deploy malicious Safes): etherscan.io/address/0x8b77… With the help of SEAL911, Hypernative, and Blockaid, we investigated the attack pattern and identified ~5,000 malicious addresses. These addresses have been flagged as malicious via SafeShield (powered by our security partners) and are being removed from Safe Wallet’s UI, reducing the risk of accidental interaction. Please note: similar schemes are easy for malicious actors to reproduce. It’s therefore critical to follow secure signing procedures, especially for high-value transfers (e.g., verify the full address, use an address book/allowlist, confirm recipients out-of-band, make a smaller transfer first). Address poisoning and social engineering, like phishing, are evolving and persistent threats in crypto. Defending against them requires continuous investment in both detection and UX improvements that reduce human error. For anyone unfamiliar with this attack pattern, we strongly recommend reading more here: help.safe.global/en/articles/18… Using address book in safe: help.safe.global/en/articles/23… Using address book in spaces: help.safe.global/en/articles/38… Stay vigilant: don’t trust—always verify full addresses, not just prefixes and suffixes. 🛡️ Huge thanks to SEAL911, Hypernative, and Blockaid for their rapid support.




We spent 48+ hours researching security-first OpenClaw setups. By the end of this guide you'll have: - OpenClaw on a Pi via Tailscale - Matrix E2E chat - Prompt injection hardening - No-log LLM provider - Firewall + habits for damage control It's long but totally worth it.

Can you believe it’s already February? Here’s your Ambire monthly update 🧵

Just spotted someone lost 4556 ETH (12374075 USD) due to address poisoning! Just…wow!

We're lucky to have talented creator friends like r/Ethereum moderator @ProDJKC! If you haven’t already, head over to the GridPlus YouTube channel to check out his ongoing video work.

Right up there with teaching, my time with @gridplus was such a good time. This was a pic from 4 years ago! Man...time flies when you're havin' fun.



