All
FAQ
Announcements
Product documents
How do I protect my account from Trojan horse takeovers?
Refrain from visiting untrustworthy websites or installing unknown software. Use devices and software from reputable sources only. Note: If your email, authenticator, and passkey accounts share the same login, a hacker could compromise all of them at once. Use separate accounts where possible for critical services. Your awareness is your first line of defense.Published on May 30, 2025Updated on Feb 5, 202612OKX Web3 FAQ
Activities such as money laundering, fraud, terrorist financing, sanctions evasion, system attacks, malicious code distribution, identity misuse, or API abuse may lead us to suspend or terminate access to our wallet software service without notice.As a non-custodial wallet software service, users maintain full control of their funds even if the service is no longer accessible.12. What security measures are in place to prevent illicit use of our Web3 Wallet?Published on Jan 19, 2026Updated on Feb 27, 202685How do I use a physical security key to protect my account?
Unlike software-based options, physical security keys work offline and are not reliant on cloud services, minimizing risks like account takeovers or unauthorized access.Why choose physical security key? A physical security key provides an additional layer of protection, especially against potential vulnerabilities in software-based options like authenticator apps and passkeys.Published on Jan 10, 2025Updated on Feb 12, 202618,279OKX API FAQ
If you're using a third-party software to connect with OKX and see this error, please check with the software provider if it supports regional domains. For example, EEA users must connect through eea.okx.com, otherwise the request will fail.Why does it show the error "50110" when binding to a third-party software?Published on Sep 20, 2024Updated on Apr 18, 2026137What's OKX Security Assistant?
You’ve recently installed software or plugins from unknown sources, run suspicious installers, or opened suspicious attachments. Can verify first, then handle (but don’t delay long-term) The risk level is medium, and you can clearly associate it with legitimate software components you installed. It’s still recommended to verify: Process path Source Whether there’s abnormal auto-start behaviorHow do I handle risks? Please prioritize “clean / uninstall” actions.Published on Jan 15, 2026Updated on Feb 13, 202620What can I do if my device is running in an unsafe environment?
A virtual machine (VM) is software that simulates a complete hardware system, allowing a single physical computer to run multiple operating systems independently and in isolation. Your account may be automatically logged out because the browser environment has changed. We recommend switching to a different browser and trying to log in again.Published on Jan 19, 2023Updated on Feb 12, 2026299What's OKX Web3 wallet?
Be careful when clicking on unknown links and downloading new software. Note: Using the wallet doesn't require identity verification, review, or account login. After creating or importing a wallet, you can start using it immediately without verifying a phone number, email address, or identity information. The wallet password isn't the same as the seed phrase or private key. Its primary purpose is to protect your transaction security and sensitive information.Published on Sep 5, 2023Updated on Mar 12, 2026101,438Why is my deposit/withdrawal suspended?
Upgrading the software of the nodes (also known as client software) is known as a blockchain upgrade, and does not involve changing the existing ledger. As public blockchains are decentralised, node upgrades are not compulsory. Node upgrades usually take place after a mainnet upgrade. If I encounter this situation, what should I do? We'll be keeping a close eye on the upgrade/maintenance process. Upon completion, we will resume our service immediately.Published on Aug 31, 2023Updated on Jan 26, 20261,000How do I enhance my OKX app security?
Perform a full system scan: If issues persist: Install and run a trusted antivirus software scan. Delete any detected malicious apps and associated files. Factory reset your device (if necessary): If the problem continues: Back up critical data securely to an encrypted cloud or an external device. Perform a factory reset to restore default system settings.Published on Mar 21, 2025Updated on Mar 3, 202634How do I safeguard my Web3 wallet from fraudsters?
Refrain from authorizing unknown third-party project software to prevent information leakage and potential asset lossFraud case studyFraud case study 1: Guiding users to click on unfamiliar links for wallet authorization Review of fraudulent tactics: Tactic 1: Luring users with high-yield activities to open unfamiliar links and authorize their wallets. Tactic 2: Posing as official entities and guiding users to authorize wallets.Published on Dec 13, 2023Updated on Jan 27, 20261,000Why did my account verification fail?
Ensure the photos have not been edited using image software (e.g., Photoshop) and are not screenshots. Upload color photos or files. Upload clear photos showing all four corners of the document (front and back if applicable). Make sure all pages containing important information are included. Ensure the entire document is visible, readable, undamaged, and free of glare. Confirm that the document is still valid and not expired.Published on Apr 6, 2026Updated on Apr 15, 2026How do I secure my exchange account?
The other four security features are: Authenticator app Authenticator apps are free software authenticators that add extra security to online accounts. The most popular example is Google Authenticator, which is widely used to generate time-based, one-time codes. Our users who activate their authenticator are required to provide confirmation codes when withdrawing funds or making changes to the security settings of their accounts. To activate your authenticator app, you can learn it from here.Published on Jun 12, 2024Updated on Mar 23, 20261,319
Showing 1-12 of 12 articles