vince

1.1K posts

vince banner
vince

vince

@0x_exitnode

tech journo covering crypto and AI. tracking policy, privacy, & security ✍🏻 opinions are my own 🏴 Asia reporter @decryptmedia | ✉️ [email protected]

exit node Katılım Haziran 2020
3.2K Takip Edilen625 Takipçiler
Andrew M. Bailey
Andrew M. Bailey@resistancemoney·
But if you want to poop on Hegel, no one did it better than Schopenhauer.
Andrew M. Bailey tweet media
English
1
0
4
273
Danki 🐴 ( Tin Erispe )
Danki 🐴 ( Tin Erispe )@0xDankiii·
we got pulled into something kinda wild recently. we were invited by SEC to contribute to ASEAN’s work on tokenized capital markets. not a thinkpiece, but an actual input into how RWA around southeast asia might be shaped.
Danki 🐴 ( Tin Erispe ) tweet media
English
2
0
13
514
vince retweetledi
vx-underground
vx-underground@vxunderground·
There is a project on GitHub called Axios. Axios is extremely popular. It is used by millions upon millions of applications. Axios is a programming library that helps your JavaScript code make HTTP/S requests (communicate with websites). In simple terms, if you're a programmer doing something with JavaScript, and want to do stuff that communicates with a website in literally any capacity, people heavily recommend using Axios due to its simplicity. Using Axios you don't have to reinvent the wheel and do a bunch of work. All you need to do is import Axios into your code and you're off to the races. Someone (currently unknown) compromised Axios (currently unknown how) to deliver malware to people. When someone updates or installs Axios, Axios itself contains malware. What the malware does is (currently) unknown, but it is being reversed engineered by probably every malware analyst on the planet at this moment. In a few hours more details will emerge. Information is being exchanged in real time on social media and private communication platforms as I write this. Due to the size and popularity of Axios, it is unknown how many are impacted, it could be millions, it could be thousands, or if we're lucky, only hundreds of people or organizations will be impacted. If this is absolute worst case scenario, millions of organizations across the planet have been infected with malware which (currently) we do not understand. However, the likelihood of this is low. It appears Axios being compromised was detected quickly, potentially within minutes (or hours) of it being compromised to deliver malware. Additionally, the likelihood of every single Axios user updating Axios as soon as it was compromised to deliver malware is astronomically low. It is basically zero. The impact from Axios being compromised is devastating, the fallout from this will be a massive headache. This is unironically a malware nuclear missile and will likely be studied in the future.
English
107
831
7.8K
586.8K
vince
vince@0x_exitnode·
"Historically, Lifesteal was calculated before some damage reductions or amplifications were applied. As a result, you could gain health from attacks that dealt no damage (like attacks against a hero affected by Aeon Disk's Combo Breaker). This will not happen anymore." > bear market things
English
0
0
1
51
vince
vince@0x_exitnode·
what kind of sick math is this icefrog
English
0
0
0
25
vince
vince@0x_exitnode·
All innate abilities that used to scale with other abilities now either provide unchangeable bonuses or improve on 'per level' basis Abilities that improve with hero level have base value and increment value. Some also have amount of levels required for increment > dafuq did i just read
English
1
0
0
27
vince retweetledi
Matt Liston
Matt Liston@no__________end·
I co-founded Augur, the first decentralized prediction market, and was founding CSO of Gnosis, the second. Polymarket still runs on Gnosis contracts. I'm glad prediction markets finally broke through. But I'm not going to pretend that what's being scaled right now is what we built these systems to do.
English
68
82
1.2K
106.8K
vince
vince@0x_exitnode·
aspirational
vince tweet media
English
0
0
0
40
vince
vince@0x_exitnode·
@resistancemoney markdown saved me from my personal hell aka microsoft word’s interface
English
0
0
1
19
Andrew M. Bailey
Andrew M. Bailey@resistancemoney·
guy who writes everything in markdown now, but refuses to let robots write for him
English
3
0
14
1.5K
Andrew M. Bailey
Andrew M. Bailey@resistancemoney·
need a bitcoin shitpoast? I gotchu fam. want an actual argument? we have that too. thousands of bangers for your use and pleasure, all trained on Resistance Money and on tweets from yours truly: resistance.money/tweets/
English
9
5
36
1.7K
vince retweetledi
Sander Lutz
Sander Lutz@sander_lutz·
Jeffrey Epstein was an early investor in Coinbase. Coinbase co-founder Fred Ehrsam appears to have been personally aware and supportive of the convicted sex offender’s multi-million dollar investment in the company, in 2014. Details are in the latest batch of Epstein files from the DOJ. Story here: decrypt.co/356620/jeffrey…
English
58
319
1.2K
186.2K
BlockSec Phalcon
BlockSec Phalcon@Phalcon_xyz·
.@crosscurvefi was reportedly attacked several hours ago, resulting in approximately $2.76M in losses across multiple chains, including over $1.3M on Ethereum and $1.28M on Arbitrum. The team has issued a notice advising users to stop interacting with the smart contracts. Our initial investigation suggests the root cause seems to be an authorization bypass in the ReceiverAxelar contract. A permissionless function, expressExecute(), could reach the privileged _execute() path without passing Axelar Gateway authorization. In Axelar's intended security model, cross-chain messages must first be approved by the Gateway (proof-backed) and then validated on the destination chain via validateContractCall(), which binds (commandId, sourceChain, sourceAddress, contractAddress, payloadHash) to a single authorized execution. However, the expressExecute() path skipped this validation entirely and relied only on peer checks using attacker-controlled sourceChain and sourceAddress, which provided no real security. This allowed an attacker to submit a spoofed message, take the receiveData branch, and execute an arbitrary payload that ultimately triggered unlock() on the Eywa CLP Portal, leading to unauthorized release of cross-chain assets.
BlockSec Phalcon tweet media
CrossCurve@crosscurvefi

⚠️ URGENT Security Notice Dear users, Our bridge is currently under attack, involving the exploitation of a vulnerability in one of the smart contracts used. Please pause all interactions with CrossCurve while the investigation is ongoing. We appreciate your patience and cooperation. We will provide updates on the situation through our official channels.

English
3
11
45
11.6K