Skip to content

Commit

Permalink
edits (#101)
Browse files Browse the repository at this point in the history
  • Loading branch information
filippoweb3 authored Feb 19, 2025
1 parent 97ec3b2 commit 0859c39
Show file tree
Hide file tree
Showing 5 changed files with 19 additions and 33 deletions.
2 changes: 1 addition & 1 deletion docs/general/polkadot-direction.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ slug: ../polkadot-direction
---

!!!info
The material on this page is based on [Gavin Wood's talk at Polkadot Decoded 2023](https://www.youtube.com/watch?v=GIB1WeVuJD0).
The material on this page is based on [Gavin Wood's talk at Polkadot Decoded 2023](https://www.youtube.com/watch?v=GIB1WeVuJD0).



Expand Down
23 changes: 12 additions & 11 deletions docs/general/scams.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,22 +18,23 @@ One of the most attractive targets for malicious actors are your wallet secret s
optionally exported backup JSON file. Keep them offline in a secure and private location. If you
share these with anyone, they can access your account and execute any transaction.

<div className="row">
<div className="col text--center">
<a href="https://www.youtube.com/watch?v=ARsdXZycJAg">
<img src="https://img.youtube.com/vi/ARsdXZycJAg/0.jpg" width="350" style="borderRadius: 10, border: '1px solid slategrey'" />
</a>
<p>
<a href="https://www.youtube.com/watch?v=ARsdXZycJAg">Stay Safe in Polkadot</a>
</p>
</div>
<div class="row" style="display: flex; gap: 20px; justify-content: center;">
<!-- Card 1 -->
<a
href="https://www.youtube.com/watch?v=ARsdXZycJA"
class="card-container"
data-aos="fade-up"
data-aos-delay="100"
style="width: 300px; height: 300px;"
>
<img src="https://img.youtube.com/vi/ARsdXZycJAg/0.jpg" class="card-image"/>
<p class="card-title">Stay Safe in Polkadot</p>
</a>
</div>
!!!info
Visit [this support article](https://support.polkadot.network/support/solutions/articles/65000181874-how-to-store-your-mnemonic-phrase-and-backup-file-safely) for more information about key security.



## Essential Rules

1. Never ever share your seed phrase or backup JSON file with anyone. If you do that, you hand over
Expand Down
11 changes: 2 additions & 9 deletions docs/general/start-building.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,15 +58,8 @@ below:
[adding a new system collective](https://github.com/polkadot-fellows/RFCs/blob/main/text/0012-process-for-adding-new-collectives.md)
or making changes to network parameters like inflation rate, treasury inflow etc.

!!!note Polkadot Runtime Code Changes through Root track

Although the Technical Fellowship maintains the
[runtimes of Polkadot and Kusama](https://github.com/polkadot-fellows/runtimes), changes to the
network protocol are not gated by the fellowship. Any DOT holder can submit a referendum on
[the Polkadot OpenGov Root track](../learn/learn-polkadot-opengov-origins.md#root) to set the
runtime code with the proposed changes.


!!!note "Polkadot Runtime Code Changes through Root track"
Although the Technical Fellowship maintains the [runtimes of Polkadot and Kusama](https://github.com/polkadot-fellows/runtimes), changes to the network protocol are not gated by the fellowship. Any DOT holder can submit a referendum on [the Polkadot OpenGov Root track](../learn/learn-polkadot-opengov-origins.md#root) to set the runtime code with the proposed changes.

For more information about the adoption of RFCs within the Polkadot ecosystem, see
[this Medium article](https://www.polkadotphilosophy.com/polkadots-strategic-adoption-of-rfcs-pioneering-a-collaborative-future-in-blockchain-3330843cfd4f)
Expand Down
10 changes: 2 additions & 8 deletions docs/general/transaction-attacks.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,10 +13,7 @@ signing a Transaction B. An Attack might come from:
### Clipboard Memory

!!!info
For a more detailed read about clipboard memory attacks see
[this article](https://www.kaspersky.com/blog/cryptoshuffler-bitcoin-stealer/19976/).


For a more detailed read about clipboard memory attacks see [this article](https://www.kaspersky.com/blog/cryptoshuffler-bitcoin-stealer/19976/).

This is a common attack. The clipboard memory is that memory on your computer dedicated to
copy-paste operations. There is malicious software that can be remotely installed on your computer
Expand Down Expand Up @@ -81,10 +78,7 @@ try to issue an extrinsic sending 20 DOT, the transfer will fail).
## Defense against Attacks

!!!warning
If you can't verify the transaction or you suspect you are signing something different than what you
intended, don't sign it!


If you can't verify the transaction or you suspect you are signing something different than what you intended, don't sign it!

To avoid being victim of an attack:

Expand Down
6 changes: 2 additions & 4 deletions docs/general/web3-and-polkadot.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,10 +24,8 @@ internet into a decentralized web, where users control their data and identity i
environment. The Web3 movement aims to remove intermediaries and build trustless infrastructure.
Web3 is an interactive and collaborative web where users can read, write, and **own** data.

!!!note The Web3 Movement

To learn more about the Web3 movement, check out this video from the
[Web3 Summit](https://youtu.be/l44z35vabvA)
!!!note "The Web3 Movement"
To learn more about the Web3 movement, check out this video from the [Web3 Summit](https://youtu.be/l44z35vabvA)



Expand Down

1 comment on commit 0859c39

@github-actions
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please sign in to comment.