pull down to refresh
31 sats \ 7 replies \ @xz 16h \ on: Spending 1.4BTC to send pleading texts to someone who just robbed you | REKT bitcoin
I know that the evidence indicates exactly this but would it be too wild to imagine that low-entropy keys would be perfect cover for both a clever exploit and a shadowy actor?
- Launch pool with cheapest input costs.
- Vertical growth of pool during time when many unsuspecting hobbyists are mining
- Pull rug
- Send out pleas as a cost percentage as cover
What's the line at the end of The Usual Suspects, the greatest trick the devil pulled was convincing the world he didn't exist?
the greatest trick the devil pulled was convincing the world he didn't exist?
Like the "greatest" Bitfinex hack.... that end in creating tether.
reply
reply
Bitfinex hack was in 2016. USDT was created in 2014.
reply
reply
that's not how chronology works lmao
reply
I am not talking about chronology... I am talking about how they prepared everything to became what they are today. The literal "creation" of it in 2014 it was just a preparation for they had planned for later.
You should look at the big picture, not focusing only on just 1 little square.
We are dealing with professional crooks not just amateurs...
reply
deleted by author