Third-party Function Security Authorization Prompt

Dear user,

In order to ensure that you fully understand the potential risks associated with third-party transactions and can use this service safely, please read the following information carefully:

1. Risk Warning for Digital Asset Trading

1.1 The digital asset trading market is a new and unconfirmed field with significant trading risks and policy uncertainties.

1.2 Digital asset trading involves high risks, is not time-limited, and experiences substantial price fluctuations, susceptible to the influence of market manipulators and global government policies.

1.3 Due to changes in national laws, regulations, and normative documents, digital asset trading may be suspended or prohibited at any time.

1.4 Digital asset trading relies on the internet, thus posing high risks in terms of trading and storage.

2. Global Network and Internet Transaction Risk Tips

2.1 The internet is a global public network, and the path of data transmission is not entirely secure. Therefore, data may be accessed by unauthorized individuals, groups, or organizations during transmission.

2.2 Data transmission on the internet may experience delays due to busy communication or interruptions, pauses, incomplete or erroneous data due to various reasons, leading to transaction delays, stagnation, or interruptions.

2.3 Authorization information for third-party transactions is generated by the trading platform. We recommend obtaining authorization information securely and keeping it safe to prevent information leakage.

2.4 Due to force majeure factors, such as maintenance of information network equipment, failure of information network connections, computer, communication, or other system failures, power failures, weather conditions, accidents, strikes, labor disputes, riots, uprisings, riots, insufficient productivity or production materials, fires, floods, storms, explosions, wars, bank or other partner reasons, digital asset market crashes, government actions, orders of judicial or administrative authorities, or other acts beyond our control or acts of third parties that we cannot control, may result in the inability to provide services or service delays. We do not assume responsibility for losses arising from these events.

3. Security Precautions

3.1 Strengthen the protection of identity verification and key information. Avoid applying for identity verification and key information on unofficial or insecure websites to prevent information leakage.

3.2 Handle personal information with caution. Do not disclose identity verification and key information publicly on the internet, and be careful when lending electronic devices that store such information, ensuring relevant protective measures are taken.

3.3 Guard against electronic device virus infections. Install antivirus software to prevent electronic devices from being infected with viruses, and conduct regular virus scans to prevent malicious programs from stealing identity verification and key information.

3.4 Use genuine electronic device system software to enhance the security performance of identity verification and key information, guarding against risks arising from system vulnerabilities.

3.5 For high-value transactions, it is recommended to avoid using this feature to mitigate security risks. If necessary, assume the risk yourself.

3.6 Download software through official channels. Ensure that you download software installation packages through the official website at www.otrading.io and install them in a secure computer environment to avoid the impact of counterfeit phishing software.

Please closely follow the above tips and security measures to ensure a safe and smooth transaction when using third-party trading functions. Thank you for your understanding and cooperation.

Last updated