How many mistakes? Reused address. Round amount. Mixed script types (not sender's fault). Then receiver sends straight to exchange with zero obfuscation.

Honestly tinfoil may be required in the face of this 🤡 behaviour.

Follow

For what it's worth: heard on the Risky Business podcast (IT security stuff), their working theory is that (a) perp is a teenager, heard from multiple sources, (b) the coins were actually seized they think most likely, by some govt agents "popping a shell" (or otherwise hacking) and simply sending the funds out of the perp's wallet. Interesting! No idea if true.

· · Web · 1 · 0 · 2

@waxwing if that is the case, i how they figured out what computer to hack, i mean, do spy nodes give enough confidence of the real origin of a transaction to warrant action like that
might be they had some evidence outside of bitcoin, of course, for all we know they staged the entire attack from that server 🙂

@orionwl well from the accounts of those podcasters, the implication seemed to be that they knew who he was (see: teenager), so i just assumed the hacking was based on that.

@waxwing @orionwl Oh I heard they just subpoena'd the service where the coins were sent to and took it from there...

@stevenroose @orionwl i think I've heard 3 or 4 different theories now.

@waxwing @orionwl Yeah buying from Facebook isn't something I'd feel comfortable with in the first place though. And if they include Spyware, for sure not :/

@stevenroose @orionwl yeah that's the issue. They require FB acct. For now I'm sticking with Valve. It looks like Valve are threatening to come out with a wireless option at some point, but i think it won't touch the pain points that push people to FB - the need for PC plus lighthouses, nor cost. I think.

Sign in to participate in the conversation
unidentified instance

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!