ICPsimp ☁️∞

8.6K posts

ICPsimp ☁️∞ banner
ICPsimp ☁️∞

ICPsimp ☁️∞

@ICPsimp

Just love me some good tech and innovation. $ICP But I don't know shit about shit. Just here to provide out of touch takes.

In The Clouds Katılım Ekim 2023
3.5K Takip Edilen1.5K Takipçiler
Sabitlenmiş Tweet
ICPsimp ☁️∞
ICPsimp ☁️∞@ICPsimp·
If something like the Internet Computer Protocol doesn’t succeed, I don’t see how Web3, crypto, DeFi… or even parts of Web2 don’t start to fall apart. Because the same problem exists everywhere. Web2 is built on complex, fragile infrastructure, heavily dependent on third-party vendors, constantly expanding the attack surface. “Web3” is mostly built on top of that same infrastructure. So all the dependencies, all the attack surfaces, all the vulnerabilities… they never actually go away. And we’re already seeing it. Cybercrime is rising fast. Hacks. Exploits. Drains. Data breaches. Constantly. Now add AI into that equation: faster attacks automated exploits scalable cybercrime Traditional cybersecurity can't keep up. At some point, it breaks. People stop trusting DeFi Systems fail more often Breaches increase And everything built on that foundation gets exposed If the foundation doesn’t change, nothing else matters. This isn’t just a Web3 problem. It’s an internet infrastructure problem. The solution is actually pretty simple: A less complex, more unified web stack Fewer dependencies Smaller attack surface Apps running in a tamper-resistant environment The Internet Computer Protocol internetcomputer.org Data source: sosafe-awareness.com/resources/repo…
ICPsimp ☁️∞ tweet mediaICPsimp ☁️∞ tweet mediaICPsimp ☁️∞ tweet media
English
3
8
47
5.7K
ICPsimp ☁️∞
ICPsimp ☁️∞@ICPsimp·
Another day, another exploit. @THORChain just got hit for over $10.7 million in protocol liquidity. A malicious node reportedly exploited a vulnerability in their GG20 threshold signature scheme, leaking key material over time until they could sign unauthorized transactions. This is exactly why the industry keeps bleeding. When you have complex cross-chain dependencies, MPC setups, and keys that can gradually leak, you're creating attack surfaces. ICP's architecture offers a different path: full applications hosted entirely on-chain in an immutable, tamper-resistant environment, Chain Fusion for direct cross-chain interaction without risky bridges, and Chain-Key cryptography where keys are distributed across the entire subnet. No single node or small group can compromise them, it requires a majority of honest nodes. The tech to shrink these attack surfaces exists. Time to stop shooting ourselves in the foot. Use the Internet Computer Protocol. Or it's just going to get worse. $ICP
ICPsimp ☁️∞ tweet mediaICPsimp ☁️∞ tweet mediaICPsimp ☁️∞ tweet media
THORChain@THORChain

THORChain incident update #1 THORChain contributors shared a new update in the dev discord regarding the ongoing incident. TLDR - Current evidence points toward a newly churned node linked to the attack, likely operated by a single malicious actor - The leading theory is an exploit in the GG20 TSS implementation, allowing vault key material to leak over time. The attacker may have reconstructed the vault private key and executed unauthorized outbound txs - Current network status: -- The network is paused after multiple node operators executed make pause -- RUNE transfers and chain observation may resume within ~12h unless decided otherwise by the nodes. -- Trading, LP actions, signing, and sensitive operations remain paused for now - Recovery discussions currently include slashing affected node bonds, using POL to absorb losses, or other community-driven solutions The investigation is still ongoing alongside THORSec and Outrider Analytics. ## Full Announcement ## Developers and THORSec have been investigating today’s incident continuously throughout the day. While new information may still emerge, I want to provide the community with an update based on what we currently know. The goal of this update is to clarify the current understanding of the situation as accurately and transparently as possible. A newly churned node, thor16ucjv3v695mq283me7esh0wdhajjalengcn84q, which entered the network several days ago, is currently believed to be associated with the attack. Developers have identified links between Ethereum addresses used to acquire and bond RUNE for this node, and Ethereum addresses that later received the stolen funds. Based on current evidence, it is believed this was conducted by a single malicious operator, though the investigation remains ongoing. At this time, the leading theory is the attacker exploited a vulnerability within the GG20 TSS implementation which allowed sensitive key material from vault participants to leak over time. By accumulating enough leaked information, the attacker was ultimately able to reconstruct the vault’s TSS private key and execute unauthorized outbound transactions. The Treasury is actively collecting forensic data and coordinating with Outrider Analytics and relevant law enforcement agencies in an effort to identify the attacker and pursue recovery of stolen funds where possible. Due to multiple node operators executing make pause, the network is currently paused. Unless further action is taken, the pause state will automatically expire in approximately 12 hours. At this time, the development team is comfortable allowing the pause to expire in order to restore RUNE transfers and chain observation activity. However, trading, signing, LP actions, and other sensitive operations will remain paused until the network and community align on a comprehensive recovery and remediation plan. The recovery process will likely require node governance decisions regarding how losses are ultimately handled. Several potential approaches are already being discussed, including: Slashing the bond of nodes participating in the affected vault Allowing Protocol-Owned Liquidity (POL) to absorb the loss Additional recovery proposals that may emerge from the broader community At this stage, no final decisions have been made. The team is continuing to work on a complete recovery and restart plan for the network. Bringing trading and full functionality back online will likely take several days, and potentially longer depending on the complexity of the chosen remediation path. We will continue to provide updates as more information becomes available. Finally, I want to thank the developers, node operators, security contributors, and the broader THORChain community for the enormous amount of work done today. One of THORChain’s greatest strengths has always been the community’s ability to come together under pressure, collaborate quickly, and solve difficult problems together.

English
0
4
12
322
ICPsimp ☁️∞ retweetledi
Pierre
Pierre@PierreSamaties·
The @coinbase ICP-USDT delisting is a non-event for liquidity! ICP’s primary trading pair on Coinbase is and remains USDC, nothing changes there. What’s disappointing is the complete lack of advance communication. A simple heads-up would have allowed us to help clarify this to the community and prevent unnecessary FUD during an already volatile market. Exchanges should do better than 24-hour public notice for operational changes that can shake trader confidence, even when the actual impact is minimal. Back to business.
English
46
100
459
13.6K
ICPsimp ☁️∞ retweetledi
Michel Adey ∞
Michel Adey ∞@miadey·
Hey @shanselman ! Still early, but we are running .net 10 on the $ICP blockchain. Unstoppable, sovereign and decentralized.
Michel Adey ∞@miadey

ASP.NET Core + Blazor Static SSR running on the Internet Computer mainnet with .net 10. The .wasm file is at the limit with 11mb. The /post take a second or two, but hey, it's working 4dcfc-hyaaa-aaaas-qdqbq-cai.icp0.io Let see how long will the 8T cycles last :D $ICP $Microsoft

English
2
15
64
2K
ICPsimp ☁️∞ retweetledi
Michel Adey ∞
Michel Adey ∞@miadey·
ASP.NET Core + Blazor Static SSR running on the Internet Computer mainnet with .net 10. The .wasm file is at the limit with 11mb. The /post take a second or two, but hey, it's working 4dcfc-hyaaa-aaaas-qdqbq-cai.icp0.io Let see how long will the 8T cycles last :D $ICP $Microsoft
English
7
12
44
3.6K
ICPsimp ☁️∞ retweetledi
Pierre
Pierre@PierreSamaties·
Cloud Engines -> Sovereign, tamperproof, always on, frontier cloud for agentic built software ✅️ ICP Skills (for Claude, OpenAI, Curser, Perplexity) and caffeine AI for building any app on this cloud ✅️ Agentic organization -> enable a world view / actionable knowledge graph for your entire organization, when all your apps are built on the Internet Computer with Motoko 💥
dom | icp@dominic_w

Nearly every solopreneur, startup, SME, enterprise or government department, will want to become an agentic organization (or "cybernetic org"). They will be vastly smarter, faster and more efficient. Internet Computer Protocol (ICP) helps enable this brave future. But how? 🧵

English
9
68
284
6.1K
ICPsimp ☁️∞
ICPsimp ☁️∞@ICPsimp·
I believe so too. Love seeing the tech keep evolving and becoming easier and more accessible to the world. It’s pretty neat getting to watch the forefront of a new internet/software stack unfold in real time. As usual, excited to see where this is heading. Thanks for the reply.
English
0
0
22
511
ICPsimp ☁️∞ retweetledi
dom | icp
dom | icp@dominic_w·
@ICPsimp We believe that states will be using the new agentic organization functionality, and trials are already under way..
English
5
53
207
3.8K
ICPsimp ☁️∞ retweetledi
dom | icp
dom | icp@dominic_w·
Nearly every solopreneur, startup, SME, enterprise or government department, will want to become an agentic organization (or "cybernetic org"). They will be vastly smarter, faster and more efficient. Internet Computer Protocol (ICP) helps enable this brave future. But how? 🧵
dom | icp tweet media
English
55
231
752
30K
ICPsimp ☁️∞ retweetledi
dom | icp
dom | icp@dominic_w·
@OWHistory I hear you. It's not us (even though DFINITY spends money from its endowment on the Internet Computer). Personally I find this price action completely illogical and upsetting, and DFINITY is trying to understand what's happening better. But we'll keep plowing forward regardless.
English
60
65
416
15.6K
ICPsimp ☁️∞ retweetledi
dom | icp
dom | icp@dominic_w·
— Motoko enables AI to build better, faster, at less cost, and without accidentally losing app data during updates, and... most importantly... enables the production of a World Model to unleash AI. New demos coming soon. One last thing 🧵
English
4
34
196
4.7K
ICPsimp ☁️∞ retweetledi
DFINITY Foundation
DFINITY Foundation@dfinity·
A cloud engine is a sovereign frontier cloud. Tamperproof. Fault-tolerant. Yours. → No vulnerable OS → No firewall to maintain → No sysadmin required Protocol math keeps your app running even when nodes fail. opencloud.org
DFINITY Foundation tweet media
English
11
95
356
6.9K
ICPsimp ☁️∞ retweetledi
Ahmad Manzoor
Ahmad Manzoor@AhmadManzoor1·
The future of blockchain is not just transactions, it’s full internet-scale infrastructure. ICP is redefining Web3 with fully on-chain applications, ultra-low fees, sub-second finality, and true decentralized computing. @digitalauthpk @DfinityToday @dfinity
Ahmad Manzoor tweet media
English
10
59
153
5.7K
Kraken
Kraken@krakenfx·
Kraken is deprecating its existing cross-chain provider and migrating to @Chainlink CCIP as its exclusive cross-chain infra to secure Kraken Wrapped Bitcoin (kBTC) & all future Kraken Wrapped Assets. Kraken chose Chainlink CCIP because it offers enterprise-grade infrastructure with strict security & risk management requirements, including: • ISO 27001 and SOC 2 Type 2 certifications • Secure by default architecture • 16 independent nodes • Native rate limits, and more. Together, Chainlink and Kraken can help accelerate the global adoption of crypto by unlocking utility and distribution for all Kraken Wrapped Assets across DeFi. For kBTC customers, no action is required. More details on the migration process to follow on official Kraken channels.
English
116
275
1.8K
309.6K
ICPsimp ☁️∞ retweetledi
ICPsimp ☁️∞
ICPsimp ☁️∞@ICPsimp·
I don’t think ICP needs one killer app to go mainstream. Not for the main target market. Maybe for the crypto bros to come in though. Did one single app make AWS or Google Cloud mainstream? No. The infrastructure became useful enough that businesses built services around it. That’s how I see @dfinity right now. They’re building the infrastructure. The ecosystem around that comes next. We’re already seeing early versions of that with projects like @SwissSubnet working on real-world digital infrastructure adoption. That’s exactly what I mean by sister services, teams that learn ICP’s architecture, understand the value proposition, and help governments, enterprises, and organizations migrate onto it. Also things like @WaspTechnology getting WordPress running fully on-chain. That’s another example of people leveraging ICP to build services on top of the infrastructure. WordPress powers a huge portion of the internet. If projects can make migrating something that familiar easier while showing the security, resilience, and architecture benefits, that’s a massive onboarding path. That's just a couple of examples. Other could be @junobuild , icp.ninja, @caffeineai , ect... other people are building services and tools to make building on and use ICP easy and show the benefits. Tools and services are the main thing in my opinion. Things that solve issues and have a good value proposition or use. I think things like Orbit.global are useful as well. @anvil_ic is building something neat too. ICP is a completely different architecture, so naturally there’s a learning curve. New tooling, new development patterns, even languages like Motoko. But once more companies see the value proposition and start building services around helping others adopt it, that’s when things really start scaling. I think ICP goes mainstream because of the architecture and ecosystem built around it, not one random app.
English
0
2
16
275