Select Page
Guardian Papers 4: Beware the Impersonator

Guardian Papers 4: Beware the Impersonator

Congratulations hero, you’re ready for the second module of The Guardian Papers. In our introductory lessons, we discussed the absolute bedrock fundamentals for safely navigating the web3 frontier. Now that you’ve mastered the basics, it’s time to move on to the basics of digital self-defense in specific circumstances. 

If you feel like you need a refresher on any material covered in module 1, don’t hesitate to dive back in!

Prepare yourself to move on from simply scratching the surface. For module 2 we’re going to dive into the underbelly of digital villainy in the web3 world, and talk about some of the most common ways that the good people of the blockchain world are preyed upon.

To protect yourself, you must first understand the danger.

Scam Profile: The Impersonator

Imagine, noble citizen of the web3 world–

You’re minding your own business, heading over to GalaSwap to make a few small trades and maximize your May Mayhem experience.

You click a handy link off Discord to It loads a little slow and the layout looks to have changed very slightly… must’ve been an update. For some reason you aren’t logged in… that’s weird, you were just a little while ago. But that can be easily fixed! Then you notice something weird after you put in your transfer code… you can’t see your balances or accept any swaps! 

Suddenly panicking, you switch over to a new tab and open your inventory… oh no! Your wallet is drained! Looking back at that link… an upper-case ‘i’ sure looks a lot like a lowercase ‘L’ 😭

You’ve just fallen victim to an impersonator scam. This one may have been elegantly simple, but they come in all shapes and sizes. Even a small scam can mean total damage.

Did we even have to change the L to an i though? A link can be anything, the text that you see is just an anchor that the real URL is tied to. Case and point — where do you think this leads? (I promise that L is not an i!)

This con relies on the scammer earning enough of your trust that you give them sensitive information before thinking twice. These types of scams get easier to recognize and rebuff as you become more experienced in the web3 world. They can also, however, almost always be prevented by maintaining normal security standards, no matter the situation.

The Personal Touch

We’re all humans and that means we’re instinctively social creatures. When a scammer is trying to gain your trust, they have two options. They can either set up an impersonal trap like we mentioned above, or they can reach out more directly to their victims. A wide-reaching trap may catch a few marks for them, but many scammers will target individuals knowing that it’s a faster way to generate the trust needed for the con to work.

Sometimes, even a simple misspelling or low effort fake name may be enough to trick someone.

In this example, someone in a hurry may not even notice that extra s before reaching out to their friendly, neighborhood Taco!

Since this scammer has Taco’s exact PFP, they are counting on the trust that people associate with that image making them let down their guard enough to get sensitive information.

Someone only has to trust the scammer for a few minutes to make a horrible mistake!

We all know to look out for scammers… and we’d all like to think that we’re far too observant for it EVER to happen to us. But it still happens. 

Just because someone is a scammer doesn’t mean they’re incompetent. They know what works and how often… after that it’s just a numbers game until we all wise up to their tactics.

Here’s one we’ve all likely seen before, but they’re almost always targeted at someone who needs help and isn’t aware of what proper steps to take next.

When we want help, we want to be helped. The scammers are counting on this. When you can’t figure out what to do to fix a problem, frustration will start to build. A good scammer sees how long you’ve been looking for answers, and understands how frustrated you must be getting with the situation.

After that, it’s just a matter of providing you what you want to see in that moment – someone offering a simple and quick solution. This is the kind of situation that arguably traps the most victims for the web3 bandits.

Humans tend to see what we want to see to some degree, particularly at elevated levels of stress. If you’ve ever fallen for these types of scams, you shouldn’t feel ashamed. Many scammers out there are very good at what they do… which is why we all have to know more so we can fight back better.

This particular scammer seems to have found the ideal mark… the victim announced that they are having trouble sending $GALA and that there’s a problem with their wallet connection. 

These are easy pickings for a scammer. Often when they are initiating the conversation, they’ll be attempting to extract very sensitive information, like your seed phase or transfer code. Since they know this person is having trouble connecting a wallet and sending $GALA, the bad guy wouldn’t have to gain full control over the wallet to make a buck off the poor mark.
Once they can grab you in DMs, they’ll start “tech support” on it, which will often end with you either sending $GALA to their address or linking your wallet to their dApp surprisingly quickly.

The key here is trust. Once someone has your trust, they can usually make you compromise one security measure or another using some tried and tested methods.

The phrase “con man” or “con artist” comes from “confidence man.” These are criminals that have always existed, though the term first came to prominence in the mid 19th century. Even back then, everyone understood that confidence alone can often be enough to win trust. These scammers sound convincing, because that’s their profession… to be confident and gain your trust.

Here we’ve got a closer look at the profile of one scammer on the prowl. They call themself a dev in their name. Well that settles that!

Notice that “Discord Owner” is in the profile description box, meaning they wrote it in themselves. Since you see it before the “Role” section when you scroll down, however, your mind can easily just associate that name with “Discord Owner” and then Admin and Mod underneath!

They have used emojis in the about me section to make their “Admin” and “Mod” text look more official, as if that were a standard tag to denote role.

As usual, it’s all very convincing until you get down to the stuff you can’t fake. This person has been a server member for a very short time… how likely is it that they are the server owner?

Finally, we come to their role and see a simple member role. Since this info is below the lies above… will a person be more likely to disregard the information they see first or second?

When taken in isolation like this, many of these tactics seem so obvious. A scammer doesn’t have to succeed every time to make off like a bandit though. During the hustle of everyday life, there’s surely a moment or two when you let your guard down. That’s payday for the scammers.

This scammer rolls a lot of the concepts we’ve discussed into one effort. Their name isn’t particularly impersonator, but they’ve included the hexadecimal ETH prefix for a small air of authority.

They see that the victim is having trouble connecting a wallet. As we discussed above, this is a prime moment for these predators to strike. 

Realistically, this scammer knows that this user is likely trying to connect the wrong address… time won’t help.

At first, the scammer is just helpful. They don’t try to immediately push too hard, even mentioning that it may just need more time.

After being given a moment to consider the helpful stranger’s advice, the mark comes straight back to the scammer and asks for their help directly. Here again, we see the scammer build trust… they don’t immediately jump on the opportunity to strike but instead tell them they should talk to an admin.

When an admin fails to respond untagged after a few minutes, the scammer is quick to jump in and mention that they’ll send the mark the right way if they’d only DM them. Once the victim has reached out via DM, they’ll likely be sent a link to another user… the impersonator admin. They could also be sent a fake help desk link as we’ve seen above.

We have to stress again… absolutely anyone can fall victim to these kinds of tactics!!! People have used these kinds of cons for generations because they work! The best way to make sure that they don’t work on you is to learn about them and know better.

Did You Know? Victor Lustig famously sold the Eiffel Tower to scrap dealers in 1925… despite not being affiliated with the French Government. Later, he pulled off the exact same swindle a second time. Don’t ever think you’re immune to a good scammer!

Staying Safe and Secure

We’re being a bit drastic because this is a serious issue. Realistically, are there scammers everywhere throughout the web3 world and you should just be suspicious of everyone all the time?

No. That’s not how this goes at all. Scammers are a part of life… wherever there is opportunity for them to make a buck at someone else’s expense, there they’ll be. Once you learn how they exploit people’s trust, however, their methods are much less likely to work on you.

It’s not just about protecting yourself though. These scammers continue to escalate and find new ways to trick unsuspecting people because there ARE people who are unsuspecting. No one should spend their entire existence paranoid that a scammer is coming to get them, but someone without any of the knowledge that we’ve discussed here probably should until they learn what they need to protect themselves.

When everyone knows how these people operate, they cease to operate. Scammers abound in web3 right now because people are not informed. New technology doesn’t only bring new opportunities for the world to culturally, economically and socially advance… it always brings an all you can eat feast to those willing to prey on the uninformed.

Guarding Yourself and Your Community

Education is the answer. There are so many assumptions people have become accustomed to making in the web2 world, where we surrender our trust to corporations in digital spaces.

In the web3 world, you maintain control over your own digital footprint. That responsibility means there’s no corporate office keeping you safe anymore… To some degree, everyone needs to be responsible for themselves and know what they are doing and why.

This is not cause to bemoan that the digital villains will always be around… this is a time to celebrate! All we have to do to get rid of this web3 riffraff is empower each other with knowledge and the tools to protect ourselves. Do your own research (more on that in a future edition!) and share what you learn with your community.

Community is important. Have people you can turn to and ask for a second opinion. Have people who will watch your back and share important information and knowledge. Have a community you trust… without having to trust some faceless corporation with ownership of all your stuff.

Guardian Papers 3: Wallets

Guardian Papers 3: Wallets

When you get change back at the grocery store, do you tell them to hang onto it until next time? No! You put that money in your wallet where you can ensure that your property stays protected. This is the exact same in the world of blockchain. Your wallet allows you to safely store digital items like currencies and NFTs in a private place where you always have control over your property.

Welcome to our 3rd installment of The Guardian Papers – the series where we discuss how best to defend yourself from threats in the digital frontier of blockchain technology. 

The revolutionary concepts of blockchain have the potential to create a better world and offer new and exciting opportunities for all its early pioneers. Just as opportunities exist for those noble individuals who champion this fledgling community, however, the villains that lurk in the shadows will also capitalize on weaknesses whenever they can.

The best defense for all of us against the thieves, scammers and general malcontents in this space is to propagate the knowledge and skills that can empower our entire community to feel empowered to defend themselves. Then we can look out for each other, serving as sentinels against all threats that may harm any citizen of the digital world.

What is a Blockchain Wallet?

The idea of a wallet seems simple enough. It’s the place where you put your money. There are certainly nuances that should go into a more formal definition, but that function is consistent with any wallet– from that leather tri-fold in your pocket to that slick hardware wallet that protects your valuable coins, tokens and NFTs.

Unlike those scraps of paper and shiny bits that people may put in a traditional wallet, however, in the crypto world your digital assets exist on the blockchain and can’t be folded up and taken with you. The blockchain itself records the history and protects the security of your transactions, and a wallet gives you your own private parking spot on the chain itself.

A place to put your stuff on the blockchain only fills half the purpose of your wallet though. As we’ve previously discussed in regards to private keys, you need your keys to be able access your assets. What good is a wallet that doesn’t open, no matter how well it protects your money? In addition to offering you an address to store your assets on the blockchain, a wallet must also offer you keys to securely access your digital hoard.

Caption: With a properly secured wallet, you can soar through the blockchain world with confidence!

What’s the Difference Between Wallet Options? 

Your wallet offers you the security of having a blockchain address with public keys so you can receive and store your assets, as well as private keys so that you can securely access them.

Beyond those two points, however, there is a wide variety between different wallets and their functionality. Often people will use multiple wallets throughout their financial infrastructure for different types of assets and situations.

Supported Assets 

There are many different blockchains out there, and each coin and token functions on a specific blockchain. There are certainly exceptions to this rule when dealing with more complex topics like bridges, wrapping and layer 2 solutions – but no wallet is going to support every chain and asset that exists.

The wallet provided as part of your Gala Games account is based in GalaChain and can support transactions throughout the entire Gala Ecosystem. It is also compatible with the Ethereum Network, and can bridge between the two chains using the Gala platform and hold any Ethereum assets, such as ERC-20 tokens

It’s important to note that you can’t just send any asset to any wallet. You’ll notice that your Gala Inventory shows a different address for Ethereum and GalaChain. These are not interchangeable! Attempting to send your assets from Galachain to a blockchain address that doesn’t support them could easily result in your treasures being lost in the void of digital space.

Occasionally, you could wind up with more assets in your wallet than you realize. You’ll often need to set up support for a token on a particular wallet. In these cases, even though your items are in your wallet, you won’t be able to see them through your wallet until you follow the wallet’s procedure to add the token.

Hot vs Cold

Whether a wallet is “hot” or “cold” refers to if it has any connection to an external network. A hot wallet is any wallet that is stored on a device connected to the internet or any other network that allows it to potentially be accessed from outside the device itself. This covers most of the widely used wallets out there. 

While you may only transmit public keys to sign transactions, your private keys can still be vulnerable to sophisticated attacks from outside forces. Hot wallets can certainly be secure, but also require that you pay very close attention to device security and protection and who you connect your wallet with.

Cold wallets aren’t connected to anything on any network. Your loot exists on the blockchain itself, but cold wallets store the keys to it safely offline where they can’t be accessed unless villains happen to get their hands on not only the physical device itself, but also acquire any needed passwords, PINs, seed phrases, or biometrics to open the vault. These can be set up on any unconnected device, but also includes standalone, dedicated hardware wallets that sign transactions offline within the device itself to access funds.

Features and Opportunities

Many wallets offer specific features and functionality that may make them preferable to use compared to other wallets. You may decide, for instance, that using a multi-chain wallet like Metamask is a better fit for you than another option because its browser extension is convenient to use and it can be used to hold any ERC-20 token, and it supports a ton of other networks.

You may opt instead for a more involved software wallet that offers more onboard analytics and data so that you can use it much more as a one-stop-shop for your asset management.

Just like with the management of physical assets, sometimes what works best for you has more to do with things like location and efficiency. Though the idea of location is a little different in the digital world, thinking of different blockchains as bordering countries may be a useful comparison. 

There are usually ways to send your assets from their native chain to another, but it is usually far less convenient than transacting within their ecosystem within the chain. This may mean that a wallet with access to an address on a certain chain could prove more useful to you than another based on what your plans are with your digital treasures.

When Is a Wallet not a Wallet?

Your wallet and the keys that access it are your personal sovereignty in the blockchain world. There are many different types of wallets out there, but it is always important to remember that if you do not control it, it’s not your wallet. 

Blockchain technology was founded on the pursuit of trustless systems. While that manifests as a spectrum across different platforms and ecosystems, if it’s not your keys, it’s not your crypto!

While having assets intertwined in curated ecosystems like centralized exchanges happens sometimes, the private keys to these coins and tokens are held by the company who runs the exchange. 

A centralized exchange may have a native wallet that allows you control over your keys, but anything on the exchange itself is simply a representation of your share of ownership over the exchange’s wallet. This is often functionally the same… but in a pinch, a corporation is less worried about your interests than their own.

Reinforce Your Wallet

Your wallet is your personal treasure trove in the blockchain world, so you need to fortify it as best as possible. As we’ve discussed previously, this starts with protecting your private keys. If your most valuable treasures are stored in your own private vault, how fervently should you protect that one key?

Protecting your wallet isn’t just about keeping the bad guys out, but also ensuring that you can always get in. Recovery phrases should always be stored offline– preferably in non-digital, non-perishable formats. Getting fancy with spy-like security can be fun, but what good is your super-secure hard drive storing your recovery phrase when you spill your coffee on it?

Sometimes an old-fashioned piece of paper tucked safely in some hiding place where it will be undisturbed is the best option. If you lose important information like your transfer code and recovery phrase, there may not be much anyone can do to save the day.

Guardians of the Digital World

We’ve covered a lot already in The Guardian Papers, but we’re not through yet. If you’ve missed anything that we’ve covered in our past installments, catch up below:

  1. With Power Comes Responsibility
  2. Private Keys

 In our next few installments, we’ll be diving into the mind of a digital villain and breaking down some of the most common scams in the crypto world and their variations. It’s easy to think that you’ll never be fooled by those kinds of shenanigans – countless blockchain warriors have thought the same. Many have fallen to these same tactics. 

More knowledge about how these enemies of personal, on-chain sovereignty can only improve your arsenal to both defend yourself and to fight back by helping to educate your fellow citizens of this new world.
If you’d like to get started exploring how to get more out of your wallet, you can check out our support article on how to import your Gala Wallet into Metamask so that you can seamlessly tie your GalaChain assets into your profile on multiple chains. While you’re there, check out some other topics. Buffing your knowledge buffs your security, and none of us can let our guard down until everyone is informed enough to be secure!

Guardian Papers 2: Private Keys

Guardian Papers 2: Private Keys

Imagine losing the keys to your house… in a world with all unbreakable windows where locksmiths do not exist. This is what’s at stake when we talk about private keys, one of the most important tools in the web3 world.

Welcome to the second edition of The Guardian Papers, the series in which we’re taking you through some of the most important security issues in blockchain, one by one. The future of decentralization can create opportunities for bad people as well as good ones; that’s the nature of empowerment.

We’re here to not only empower our community, but also to help equip everyone with the skills and knowledge they need to protect themselves 

What Are Keys?

Keys grant you access to your assets or information on a blockchain. Just like a password, you can use your private key to access your holdings in a wallet address, but the security of a key far exceeds the security of a typical password. Passwords can be hurdles to the villains that stalk the shadows of the digital world, but cracking or brute forcing a private key is a hurdle too high for anyone to jump.

There are typically two types of keys associated with any blockchain address. A private key is your personal proof of ownership and should not be shared with anyone. This private key is known only to you, and due to blockchain’s decentralized nature your private key is how you prove to the network that the assets held at that address are actually yours. This itself prevents many of the methods that the bad guys will employ to prey on individuals in less sophisticated digital spaces.

A public key is the one that your wallet will share while transacting. Your public key is actually derived from your private key through complex mathematical calculations, but due to the high level of encryption, the process can’t be reverse engineered. This means that your public and private keys are matched pairs– one is your visible footprint on the blockchain while one is your personal access code.


Though not every blockchain uses the same names for them, most use some form of private and public keys.

On the Ethereum network, your wallet address actually represents the last 20 bytes of your public key. It is expressed in hexadecimal–  indicated by “0x” at the beginning of the address. Since each byte is represented in two hexadecimal digits, a full address is 42 digits long (0x+20×2)

Your GalaChain address is also expressed in hexidecimal characters. It is comprised of 24 digits, with the prefix “client|”, which can double as a unique user ID for the Gala platform.

On GalaChain, the ability to transact through the Gala platform or dApps built on chain simplifies the day to day use of your keys. Your public and private keys still control access to your on-chain items, however.

There are many independently functioning blockchains and not everything here will always be true for all of them. This is intended to be general information about how keys typically work on a blockchain, but you should always do further research to understand the specifics of any blockchain you use.

How Keys Protect Your Assets

In blockchains that use both a public and private key, asymmetric cryptography is employed to ensure that assets remain protected for a private key holder. This keeps security high even though transaction data and the public key are readily available as public information on chain.

GalaChain operates on asymmetric cryptography, just like many other chains. While your public key is used to sign transactions, your private key always stays exactly that – private.

First, your private key generates a public key with encryption software to complete the pair when you first set up your wallet. Your public key then secures data as it interacts with the blockchain so that it can only be decrypted using the private key that it pairs to. Your wallet safely stores your private key, which now is the only key that can give anyone access to your assets.

There are many nuances and exceptions to the way asymmetric cryptography works on blockchains, and there are even some chains out there that run entirely on symmetric encryption. Understanding how private keys and public keys interact and relate to each other, however, is the first step in keeping control over your crypto treasures.

It’s All In the Name

One of the key components of blockchains is transparency and history. Transaction information and data is readily available and stored within the chain itself, thus making ownership of your assets fully provable. While your public key will be visible on the network and identify your address to the chain, your private key needs to stay just that– Private!

Your private key should never be shared with anyone! This private key is designed to be stored within a wallet and should stay in one. Your private key can be imported to apps and extensions like Metamask, but make sure that you 100% trust the encryption and integrity of anywhere you are sending your private key. 

If someone has that key, they then suddenly own your entire digital hoard. While your private key may be able to be recovered with a seed phrase or recovery phrase, nothing can be done to prevent anyone who gains this key from immediately accessing your wallet. This cannot be restated enough times: Any individual asking for your private key is up to no good!


A wallet doesn’t actually store your currency, but rather stores and controls access to the keys that can access the address the currency is stored at.

This means offline solutions like hardware wallets store your private keys in a secure environment, not accessible remotely.

When your private key is secure in a wallet, it signs transactions without being exposed to the network because your public key recognizes its other half. Though we use alphanumeric characters to express a private key, it’s in fact a seemingly random number of hundreds of digits long– the type of math us mere mortals use to keep your defenses impenetrable. Reverse engineering a private key from a public key is something that is beyond the technology of even a real life supervillain.

Control Your Lock and Your Key

The revolution that blockchain technology represents is all about sovereignty over personal property without barriers in between you and your assets. Maintaining control over your assets opens countless new possibilities, but that comes with responsibility.

Blockchains give you sophisticated tools to protect your assets, but in the end it all comes down to you. Maintaining a thorough security infrastructure on any device that your wallet is connected to will ensure that the lock on your vault is essentially impenetrable… but any lock is easy to penetrate if you hand over the key.

Your private keys are yours and yours alone. They should never be shared with others or transmitted digitally, and should preferably be stored offline whenever possible. Your keys are direct access to your treasures, so that’s what the enemies of digital sovereignty will come after… but you’re not alone in this fight. 

As long as there are easy victories to be had in our community for the bad guys, they’ll be hungry for more. Only by educating and empowering everyone within the blockchain world to protect their private keys can we shut out the brigands who seek to cheat their way through this digital frontier.

The First and Last Guard

We’ve already covered a lot of ground in The Guardian Papers on how to keep yourself secure in the decentralized world, and our next installment will take us even further yet as we explore how 2-Factor Authentication is crucial for healthy defenses.

In the world of Web3, you are the first and last guardian of your assets. This may sound overwhelming, but that is the cost of the power of controlling and owning assets without the interference of a larger organization. You have the tools at your fingertips to easily maintain defenses that can’t be matched in the pre-Web3 world. 

Here at Gala, we believe that empowering the players is about more than just ownership. It represents a responsibility to educate and arm the community with the knowledge they need to protect their control over their assets. As a community, the responsibility to spread wisdom that could help any member protect themselves is carried by all of us… until none of us are threatened. 

Our security on chain may be strong, but we are always infinitely stronger together.

Guardian Papers 1: The Responsibility of Empowerment

Guardian Papers 1: The Responsibility of Empowerment

This is the future, where ownership is real and the physicality of an object, idea or asset is less important than what it represents.

At Gala, we empower people to own their content through web3 tech. Thanks to the innovations of GalaChain, users can actually own the content they interact with. This revolutionary idea was first explored in finance and entertainment… but as demonstrated by the recent GALAthon hackathon event during GDC 2024, its applications are limited only by imagination.

Vast amounts of users and resources are already flowing through web3 ecosystems, and this is just the beginning. Still, many newcomers underestimate the risks of the space, as well as the enhanced security that true responsibility for one’s assets demand.

You shouldn’t have to trust faceless corporations to protect your interests. You should, however, have the skills and knowledge to trust yourself when the power is in your hands.

Only YOU can ensure your web3 safety!

Welcome to the Guardian Papers

From our staunch desire to both protect and empower members of our beloved community, the Guardian Papers were born. Through this series of articles on the responsibility of ownership, security guidelines and red flags, we hope to empower our community with something more valuable than any physical or digital asset: education. 

We want each of you to have the tools to effectively avoid the scams that can unfortunately still be found lurking in the corners of the Web3 world. We utilize blockchain systems for their unmatched security potential, but there will always be people who make it their life’s work to prey on the under informed, the gullible or – worst of all – the generous. This is a frontier. Frontiers have heroes… but they also have villains.

Understanding and staying ahead of the bad actors is an important part of doing your own research or due diligence– phrases you’ll continue to hear over and over in the web3 world. In this world, your money is no safer than your wallet, your wallet is as safe as your private keys, and your private keys are nothing short of sacred to you. Lose your firm, secure grasp on any of these things and your assets may be as good as gone. This is decentralization. There is no big bank ready to protect you and replace funds that were taken fraudulently. It’s all on you. The power is with the people.

Almost anyone can enjoy all the empowerment of the web3 space… as long as they also understand and accept the responsibilities.

Trust Yourself

Do not let these warnings make you afraid, but instead rise to the challenge of practicing basic security measures to keep your stuff safe! You are more capable of protecting yourself than any corporate bank, but you will have to spend some time and energy taking this power and responsibility into your own hands. This is still totally new, and we all have to learn new habits and routines.

The web2 world encouraged us to focus on simplicity and trust in the financial system. The convenience of cash transfer apps, debit cards and anytime/anywhere banking have taught us that money can move quickly and smoothly behind the scenes with little effort on our part. While highly convenient, it is easy to forget that this system requires trust of countless entities who are essentially strangers to you. With web3 tech, we are rapidly moving toward eliminating the need for trust. When trust is removed from the equation, a scammer’s power over victims is vastly reduced. You have the power to fight bad actors, you just need to learn to use it!

Owning crypto may not require you to trust a bank, but you must always trust yourself. You must trust yourself to never lose your seed or recovery phrase. You must trust yourself to take careful and deliberate actions when trading, transferring, purchasing, bidding, etc. You must trust yourself to follow the income tax laws of your country, realizing that while only you can hold yourself responsible, others will certainly hold you accountable.

Be a Watchdog

We understand that there will always be those who take advantage of anything with value. Become vigilant. Pay attention to the actions of those around you. Help your early adopter peers by watching their backs. These impersonators, imposters, phishers and frauds will always pollute the most successful blockchain communities. Their power will be continually reduced as web3 evolves toward its true potential. There is a constant battle between those here to engage with blockchain systems in the correct ways and those that are just here to try and take from others.

The Reality of Scams

Focus on protecting yourself and your fellow community members through open communication. Enhanced community looking out for each other… that’s making sweet and delicious lemonade out of some really bitter lemons.

Scammers and cheaters are not going anywhere, but the more people we can empower throughout the world, the fewer people will be driven to these types of malicious activities… and the more we’ll all be able to protect ourselves and each other. Doesn’t it feel good to be part of the solution for the big problems?

Within the Gala team, there are ongoing and passionate conversations about the importance of building a road for our growing community that is always safer and straighter than the one before. We’re proud to have been rated the most secure altcoin in the world, but there’s always room for improvement.

Upcoming Papers

This article is merely an introduction to the Guardian Papers series, which will be published over the coming weeks and months to ensure basic security information is available to all newcomers to the Gala community. 

Each relatively short article will have the intention of raising awareness to a specific security concern, but these articles are far from the whole story. We encourage every one of you to always stay vigilant and informed, and please, do your own research.

Stay tuned and stay safe!

Our mission of empowerment is becoming a reality, and as any friendly neighborhood Gala community moderator would tell you, with great power comes great responsibility.