All
FAQ
Announcements
Product documents
How do I protect my account from Trojan horse takeovers?
Tampered Software Installers Some applications are repackaged to include hidden malware such as keyloggers or remote access tools. These are commonly distributed via unofficial platforms like torrent sites, public forums, or social media. Phishing Emails and Attachments Emails disguised as bills, delivery notices, or company updates may contain dangerous links or attachments designed to deploy malware. Risky file types include .exe, .zip, .docm, and .xlsm.Published on 30 May 2025Updated on 5 Feb 202610OKX P2P dispute handling rules
*Uncooperative or bad-faith behaviour including but not limited to; engaging in any fraudulent activities with the intention of deceiving their trading partner, non-paying buyers and non-releasing sellers, abusing the dispute process by creating false dispute and accusations, unresponsiveness, delayed, hostile communication or hidden fees or charges or any attempt to change the terms after the order has been created and leading other users to communicate or trade outside of OKX P2P trading platformPublished on 28 Aug 2023Updated on 11 Mar 20261,107
Showing 1-2 of 2 articles