Gate 廣場「創作者認證激勵計劃」開啓:入駐廣場,瓜分每月 $10,000 創作獎勵!
無論你是廣場內容達人,還是來自其他平台的優質創作者,只要積極創作,就有機會贏取豪華代幣獎池、Gate 精美週邊、流量曝光等超 $10,000+ 豐厚獎勵!
參與資格:
滿足以下任一條件即可報名👇
1️⃣ 其他平台已認證創作者
2️⃣ 單一平台粉絲 ≥ 1000(不可多平台疊加)
3️⃣ Gate 廣場內符合粉絲與互動條件的認證創作者
立即填寫表單報名 👉 https://www.gate.com/questionnaire/7159
✍️ 豐厚創作獎勵等你拿:
🎁 獎勵一:新入駐創作者專屬 $5,000 獎池
成功入駐即可獲認證徽章。
首月發首帖(≥ 50 字或圖文帖)即可得 $50 倉位體驗券(限前100名)。
🎁 獎勵二:專屬創作者月度獎池 $1,500 USDT
每月發 ≥ 30 篇原創優質內容,根據發帖量、活躍天數、互動量、內容質量綜合評分瓜分獎勵。
🎁 獎勵三:連續活躍創作福利
連續 3 個月活躍(每月 ≥ 30 篇內容)可獲 Gate 精美週邊禮包!
🎁 獎勵四:專屬推廣名額
認證創作者每月可優先獲得 1 次官方項目合作推廣機會。
🎁 獎勵五:Gate 廣場四千萬級流量曝光
【推薦關注】資源位、“優質認證創作者榜”展示、每週精選內容推薦及額外精選帖激勵,多重曝光助你輕
Ex‑SEAL Warns: North Korean Crypto Infiltration Far Deeper Than Believed - Crypto Economy
TL;DR
Pablo Sabbatella, founder of the Web3 audit firm Opsek and a member of the Security Alliance, made an alarming statement, referring to the extent of North Korea’s operations in the cryptocurrency ecosystem as “much worse than everyone thinks.”
He made the claim in an interview with DL News, where he also revealed that North Korean infiltrators are reportedly embedded in up to 20% of all crypto companies globally.
The threat is not limited to external hacks, the expert assured, stating that these have already stolen over $3 billion in the last three years to fund Pyongyang’s nuclear weapons programs, according to the US Treasury. What is most concerning is the internal access: these operatives are hired by legitimate companies, gaining access to critical systems and operating infrastructures that support major platforms.
The rate of penetration attempts is even more alarming. The expert estimates that between 30% and 40% of job applications received by cryptocurrency companies come from North Korean actors. The magnitude of this infiltration effort, if the figures are correct, poses a colossal systemic risk to the sector.}

How North Korea Achieves Infiltration into Crypto Companies
North Korean workers do not apply directly for jobs due to international sanctions. Instead, they are experts at developing “fronting” methods to evade detection and thus infiltrate crypto companies.
They typically use freelance platforms like Upwork to contact unsuspecting remote workers in developing countries, especially in Ukraine and the Philippines, to act as intermediaries.
The offer is simple: the collaborator hands over their verified credentials or allows the North Korean operative to use their identity remotely, in exchange for 20% of the earnings, while the operative keeps 80%.
To circumvent geographical restrictions and obtain a US IP address, North Korean hackers infect their “front person’s” computer with malware to gain remote access. Once hired, they are often valued by companies. Sabbatella commented that “they work well, they work a lot, and they never complain.” A security measure he suggested to detect these infiltrators is to ask them for their opinion on Kim Jong Un, as “they are not allowed to say anything bad” about their leader.
Sabbatella concluded by attributing the success of North Korean criminal activities to the industry’s weakness. “The crypto industry probably has the worst operational security in the entire computer industry,” he stated, pointing out that founders are fully doxxed, mishandle their private keys, and are easy victims of social engineering. This lack of OpSec is the true Achilles’ heel that enables the alarming North Korean infiltration into crypto companies.