Used in blockchains when someone steals a user’s private keys through manipulation or trickery by deceiving the user (victim) into signing a transation that delegates approval of the user’s tokens to the scammer. In essence, it gives the scammer control over a user’s crypto assets. This can happen over a period of time of multiple ice phishing attacks allowing the scammer to accumulate approvals to the point of draining the user’s entire wallet.