pull down to refresh
Why do you list sources not in the text? I see that you do this not only in this post. What are you, dear @Bell_curve, experimenting with? Why is a post of mine in the list? Why is the comment outlawed?
Don't move. Reaction time is a factor in this, so please pay attention. Answer quickly as you can.
You're watching TV. Suddenly you realise there's a wasp crawling on your arm. You...
reply
Looks automated, sprinkled with some AI-generated text, no?
reply
Yes, definitely. Some kind of automated TL;DR
reply
Yes. And outlawed due to many down votes. People generally don't like blatant low effort AI content here ;)
reply
The query refers to an article on Stacker News titled "My project got hacked and user funds were stolen." The article discusses the author's experience with a hack on their BitcoinLink service, which allowed users to send bitcoin via one-time-use reward links redeemable through Lightning. Despite the theoretically sound approach, the author made an implementation mistake that allowed a hacker to access both the encryption secret and the encrypted Nostr Wallet Connect (NWC), leading to the theft of user funds. The author details the hack, how they fixed it, and the lessons learned from the experience, including the importance of code reviews and auditing code for security[1].
Sources
[1] My project got hacked and user funds were stolen \ stacker news ~devs #577322
[2] Frequently Asked Questions \ stacker news ~bitcoin https://stacker.news/faq
[3] Observing pulsars and fast transients with LOFAR https://www.aanda.org/articles/aa/full_html/2011/06/aa16681-11/aa16681-11.html
[4] stacker news https://stacker.news
[5] [PDF] Product Catalog Table of Contents - Performance Foodservice https://www.performancefoodservice.com/-/media/PFS/Files/Publications/Springfield/Product-Catalog_August.pdf
[6] items/567321/related \ stacker news #567321/related