pull down to refresh

I know that the evidence indicates exactly this but would it be too wild to imagine that low-entropy keys would be perfect cover for both a clever exploit and a shadowy actor?
  • Launch pool with cheapest input costs.
  • Vertical growth of pool during time when many unsuspecting hobbyists are mining
  • Pull rug
  • Send out pleas as a cost percentage as cover
What's the line at the end of The Usual Suspects, the greatest trick the devil pulled was convincing the world he didn't exist?
the greatest trick the devil pulled was convincing the world he didn't exist?
Like the "greatest" Bitfinex hack.... that end in creating tether.
reply
0 sats \ 4 replies \ @xz 15h
My memory is so hazy on the never ending dubious hacks and rugs. Love to explore that whole fiasco again one day.
Is that part of how Tether came to be?
reply
Bitfinex hack was in 2016. USDT was created in 2014.
reply
you have to study more about those events. here a comprehensive list:
reply
0 sats \ 1 reply \ @lightcoin 9h
that's not how chronology works lmao
reply
I am not talking about chronology... I am talking about how they prepared everything to became what they are today. The literal "creation" of it in 2014 it was just a preparation for they had planned for later. You should look at the big picture, not focusing only on just 1 little square.
We are dealing with professional crooks not just amateurs...
reply
deleted by author