- A third party entity had attacked the Trinity wallet from moon pay on the 12th of Feb of 2020.
- IOTA said that the migration software has been thoroughly tested by the IOTA foundation themselves and has also been audited by a leading and top security firm.
It is critical that if you were using the Trinity software from the December 17th of the year 2019 to the February 17th of 2020, you need to quickly take action to prevent theft, as your tokens might be at risk.
The Trinity is a wallet software for the IOTA digital asset that has been developed not only for desktop but also the mobile operating systems. The IOTA foundation manages this open-source software, and it allows it’s users to easily be able to manage their tokens over the IOTA’s network.
A third party entity had attacked the Trinity wallet from moon pay on the 12th of Feb of 2020. This event had resulted in the theft of around 8:55 Ti in the IOTA tokens.
The tool that is used for the migration of the seeds for all the operating systems like windows, mac os, and Linux is now officially available as a part of IOTA’s plan made in the interest of protecting the users from the Trinity Wallet attack.
The seed migration software is very easy to use a piece of software that can automatically migrate IOTA tokens to a new unaffected seed from the potentially exposed and unsafe seed for windows, mac os, and Linux.
IOTA said that the migration software has been thoroughly tested by the IOTA foundation themselves and has also been audited by a leading and top security firm.
There are three steps mentioned by the IOTA Foundation on their official website that will allow the users to migrate their tokens to a brand new seed.
Step 1:- Make sure that you are using the latest version of Trinity. If not then update Trinity to the newest version.
Step 2:- Download the migration tool from IOTA’s website.
Step 3:- Simply follow all the steps in the migration tool.
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post?