SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum -- Ignore unavailable to you. Want to Upgrade?


To: gg cox who wrote (171442)5/9/2021 10:30:56 PM
From: gg cox  Respond to of 217752
 
milkyeyetwo
Information on milkyeyetwo
This information is updated hourly.

Trade volume
0-0.5 BTC

Number of confirmed trades
2
…with 3 different partners

Feedback score
100 %

First purchase
7 years, 4 months ago

Account created
7 years, 4 months ago

Last seen
just now

Language
English

Email
Verified 7 years, 4 months ago

Phone number
Verified 3 years, 5 months ago

ID, Passport or Driver’s license
Verified 3 years, 5 months ago

Trust
Trusted by 0 people

Blocks
Blocked by 0 people

Already trusting milkyeyetwoIt's you

Report this user



To: gg cox who wrote (171442)5/10/2021 12:29:20 PM
From: TobagoJack1 Recommendation

Recommended By
Maurice Winn

  Respond to of 217752
 
Love the action, the to & fro, the arena

decrypt.co

Malicious Tor Network Servers Are Targeting Users’ Cryptocurrencies

An unidentified hacker has been conducting a large-scale attack on the Tor Network for over 16 months, hijacking up to 25% of its “exit relay” capacity.

By Liam Frost

In brief
- An unknown hacker has been adding thousands of malicious servers to the Tor Network since early 2020.

- Acting as "exit relays," the nodes are pinpointing and modifying users' data to steal their cryptocurrencies, a new report suggested.
Users of the anonymity-focused Tor Network are at risk of losing their cryptocurrencies to a continuous large-scale cyberattack that was launched in early 2020, new data suggests.

According to a report published by cybersecurity researcher and Tor node operator Nusenu yesterday, an unidentified hacker has been adding thousands of malicious servers to the Tor network since as early as January 2020. Despite being shut down several times, the attacker continues to track and intercept users’ crypto-related data to this day.

Exploiting demand for anonymityTor is free and open-source software that allows users to anonymize their Internet traffic by sending it through a network of servers operated by volunteers. In order to take advantage of this system, the hacker has been adding their own malicious nodes, marked as “exit relays,” to the network.

“In May 2020 we found a group of Tor exit relays that were messing with exit traffic. Specifically, they left almost all exit traffic alone, and they intercepted connections to a small number of cryptocurrency exchange websites,” Tor developers revealed last August.

As the name suggests, Tor exit relays are responsible for sending users’ requests back into the “normal” Internet after they have been anonymized. However, the hacker made some adjustments to the code that allowed him to pinpoint crypto-related traffic and modify it before sending it out.

The Tor Project explained that these servers stopped websites from redirecting visitors to more secure HTTPS versions of their platforms. If users didn’t notice, and continued to send or receive sensitive information, it could have been intercepted by the attacker.

It is believed that the hacker is using their servers to switch crypto addresses in transaction requests made by users and redirect their cryptocurrencies to their own wallets. The hacker recently also began modifying downloads made through Tor, but it is unclear to what end or what other techniques they might be using.

Long game of whack-a-moleOver the past 16 months, the hacker’s servers have been shut down by Tor developers at least three times already, Nusenu explained. Notably, the malicious nodes accounted for roughly a quarter of the Tor network’s exit capacity on several occasions, peaking at 27% in February 2021.

Recently, the hacker even turned all of their servers on suddenly, boosting the network’s exit capacity from roughly 1,500 relays to 2,500. Such a sharp increase did not go unnoticed, however, and the malicious relays were removed.

However, the hacker is constantly rebuilding their network. By Nusenu’s estimations, up to 10% or even more of Tor’s exit relay capacity could still be controlled by the attacker to this day.

“The reoccurring events of large scale malicious Tor relay operations make it clear that current checks and approaches for bad-relays detection are insufficient to prevent such events from reoccurring and that the threat landscape for Tor users has changed,” Nusenu concluded.

Sent from my iPad



To: gg cox who wrote (171442)5/10/2021 8:05:15 PM
From: TobagoJack  Respond to of 217752
 
Re <<hackers>>

... are preferable to central banks, arguably, for the former occasionally / periodically does it to a small group of the metaverse faithful, whereas the latter does it to everybody all the time 24/7

decrypt.co

Ethereum DeFi Project Rari Capital Hacked for $11M—But It Plans to Make It Right

60% of all Rari Capital user funds were swiped over the weekend.

By Will Gottsegen

In brief

- An attacker stole 2600 ETH, or nearly $11 million, from a DeFi project called Rari Capital over the weekend.

- Rari Capital says it plans to reimburse users who lost money.

On Saturday, a company called Rari Capital announced that $11 million in Ethereum was stolen from its platform. According to a note, the amount represented “60% of all users’ funds.”

Now, Rari plans to set aside 2 million RGT (the project’s governance token) to compensate the users who lost money in the hack.

Rari Capital is a crypto fund under the heading of DeFi, or decentralized finance. It’s a non-custodial fund—meaning it runs on code that handles your money for you, as opposed to a banker or investment manager. The idea is that if you entrust Rari with your crypto, these algorithms will juice your gains (the company describes itself as a “robo-advisor for maximizing yield”).

Listen to The Decrypt Daily Podcast
Your daily dose of cryptocurrency news, learning, gossip, and discussions.

For Rari, the RGT token works a little like a voting share in a traditional company. It’s also spawned a secondary market: in the wake of Saturday’s hack, the price of RGT dipped around 50%.

At today’s prices (one RGT is back up to $12.42, though it’s been fluctuating wildly), the planned 2 million RGT donation comes in at $24 million—more than enough to cover the $11 million stolen from Rari’s users.

In a note, Rari CEO Jai Bhavnani said that Rari team members would be sacrificing their RGT allocations and putting them toward the reimbursement. The tokens, for now, will be sent back to the project's treasury, which is managed by a decentralized autonomous organization ( DAO). Rari users and token holders will then vote on whether to approve the reimbursement and, if so, how it will be distributed.

DeFi protocols are famously risky investments. DeFi “rug pulls,” a type of exit scam, were the most common type of crypto fraud scheme in 2020, according to data from the blockchain analytics firm Chainalysis.

Devotees of DeFi like that it takes banks out of the picture, but one of the nice things about banks is that they tend to keep your money safe; when a DeFi protocol’s code gets exploited, it’s on majority token-holders to decide whether to reimburse the victims.

In this case, the hackers were able to extract ETH from Rari by manipulating the code around an affiliated DeFi protocol, Alpha Finance. Rari claims the code was previously audited by a blockchain security company called Quantstamp, but says "they were not aware" of the exploit.

Says Bhavnani: “Countless protocols get hacked each year and it is a matter of how the community and the protocol that determines the future of the project.”

Editor's note: This article was updated after publication to clarify that Rari Capital's RGT token holders have not yet voted on the planned reimbursement.



To: gg cox who wrote (171442)5/10/2021 8:10:49 PM
From: TobagoJack  Read Replies (4) | Respond to of 217752
 
bitcoin help to prevent crimes

decrypt.co

Man Used Coinbase to Pay Hitman in Bitcoin for Wife's Murder, FBI Says

An FBI agent explains how a Coinbase account led the agency to the suspect.

By Jeff John Roberts

In brief

- Coinbase records provided the FBI with the suspect's photo and internet address.

- The hitman who received the Bitcoin is still unknown.

A chilling murder plot shows that while Bitcoin can be used to finance heinous crimes, it can also be the undoing of criminals who don't understand how it works.

The plot in question involves a Tennessee man, Nelson Replogle, who allegedly paid a hitman he found on a murder-for-hire website to kill his wife, Ann. According to FBI Special Agent Clay Anderson, Replogle sent the would-be killer Bitcoin along with a description of his wife's car and a time when she would be taking their pet to the veterinarian.

Agent Anderson got wind of the scheme, set out in this court filing, from the sheriff in Knoxville, TN, who told him about it after receiving a tip from staff at the British Broadcasting Corporation (BBC). The FBI agent then warned Ann Replogle and her husband, who claimed he could not think of anyone who wished to harm her.

The top 5 crypto news stories & features in your inbox each day.
Get Daily Digest for the best of Decrypt. News, original features and more.

The FBI agent then pressed the BBC staff—he does not say how the BBC learned of the plot—who then provided additional details, including the address of the Bitcoin wallet that received the murder-for-hire payment. Anderson then turned to experts at the FBI Cyber Task Force who helped crack open the case by analyzing the Bitcoin blockchain.

"FBI Headquarters provided blockchain analysis of the transaction and was able to determine that the blockchain wallets used to pay were Coinbase wallets," states Anderson.

The FBI then issued a subpoena to Coinbase for information about the wallets in question. The company then provided an immediate answer given the "threat to life"—an answer that included not only the transaction history of the wallets, but also Replogle's name and photos he had used to sign up for the service.

The FBI obtained not only these details from Coinbase but also the internet address that Replogle had used to connect at the time of the transfers. Using that information, the agency in turn issued a subpoena to the internet provider, AT&T, which confirmed the connection had come from Replogle's home.

The information provided by Coinbase also revealed the name of the bank Replogle had connected to his account. The bank confirmed that Replogle had used his personal savings account to fund the Bitcoin purchases to the hitman.

The FBI has not, however, been able to identify the hitman as yet. The reason is almost certainly because the hitman did not use a commercial service like Coinbase, which must comply with know-your-customer laws, for the Bitcoin transactions but instead relied on his own personal wallet—one that did not reveal any information about his identity.

The case underscores how Bitcoin can be used in a largely anonymous fashion, though the blockchain will nonetheless reveal every transaction that takes place on the network. It also reveals how alleged criminals like Replogle who use a service like Coinbase for nefarious activities risk leading law enforcement right to their front door.

Meanwhile, law enforcement is filing an ever greater number of requests with Coinbase. According to the company's most recent transparency report, such requests jumped 17% in the last six months alone, and totaled more than 4,000 in the last year.