ket eulenspiegel

553 posts

ket eulenspiegel banner
ket eulenspiegel

ket eulenspiegel

@butername33

Euer Narren lache ich allen, denn nur ihre Kolben tun gefallen.

Katılım Aralık 2017
18 Takip Edilen60 Takipçiler
Sabitlenmiş Tweet
ket eulenspiegel
ket eulenspiegel@butername33·
buy $ket or get punished 71vDdeajwpXGnj98kBvDZmVuuAYSPYiPbdeU5xGfbrrr
ket eulenspiegel tweet media
Indonesia
1
1
11
436
Helin Ulker
Helin Ulker@beautyofhelin·
"I'm a $BTC crypto big-timer."
English
31
7
143
7.4K
Printr
Printr@printr·
average printr staker
Printr tweet media
English
25
13
99
2.1K
Chris Thompson
Chris Thompson@chrisgivesaf·
bagworking is fun it’s as simple as buying a bag, spreading the word, winning. it’s really that easy i’ve had some of the best plays from bagworkers in my comments/dms bring back bagworking culture, this time on base. generational
English
1
1
7
142
Patrick.
Patrick.@trade·
I passed on eleven opportunities this month. Eleven. Each one had a narrative. A community. A chart that looked promising to the untrained eye. I passed because my criteria were not met. Not partially met. Not mostly met. Not met. Discipline in this market is not about what you buy. It is about what you refuse to touch. My portfolio reflects every no I have ever said.
English
71
15
237
15.5K
Liberty Swap ⚡️ Bridge2Pulse™️ Zero-Fee DEX
AI changes the threat model. With LLM-driven vulnerability discovery and exploit synthesis, the barrier to compromising one of N validators is dropping quickly. Bridges secured by multisig or MPC don’t help much if shards or signer keys are ALL online and actively process transactions. The keys securing your bridge should remain dormant in cold storage, that’s the stronger way to protect it. I hope everyone now sees the value of PulseChain’s main bridge security setup.
Charles Guillemet@P3b7_

This morning, THORChain was drained of roughly $10.8m Node operators have freezed the network for nearly 13 hours. The full analysis isn't out yet, but according to @jpthor, this could be a MPC exploit. ECDSA and TSS is hard. THORChain's vaults rely on TSS, a flavor of MPC where a quorum of nodes jointly produces a signature without ever reconstructing the private key. Clean for Schnorr or EdDSA; painful for ECDSA, which Bitcoin and Ethereum require. That's why we saw plenty of protocol attempts (Lindell17, GG18, GG20, CMP, CGGMP21, DKLS, KU23...), each patching flaws in the previous one. GG20 has a track record. THORChain's TSS uses GG20, on a fork of Binance's tss-lib. GG20 has shipped two well-publicized critical bugs: CVE-2023-33241 and TSSHOCK. CGGMP21, now cggmp24, are the latest protocols, but GG20 is still widely deployed. I often hear a misconception when I hear about MPC setup: "The key is split across many nodes, so any single co-signer doesn't really matter". In every published GG18/GG20 attack, one malicious or compromised co-signer is enough to extract everyone else's shard and reconstruct the full key. AI changes the threat model. Compromising a full software node, complex Go stack, exposed P2P, custom signing daemons, a churn protocol that admits new participants on a schedule, has always been difficult and acted as a barrier. With LLM-driven vulnerability discovery and exploit synthesis, the bar to compromise one of N validators is dropping fast. Here, it's a plausible TSSHOCK-style playbook: - compromise one operator - wait for it to churn into an active Asgard vault - send malformed proofs during keygen or signing - reconstruct the key offline - sweep in a single transaction It's unclear yet if the attacker used a known-unpatched GG20 weakness, or a fresh cryptographic flaw. But, in all cases, MPC and TSS are not a substitute for hardening every co-signer. They sit on top of co-signers that must each be treated as critical infrastructure, hardware-isolated enclaves, minimally exposed, continuously audited, and running protocol with security proofs. While the investigation progresses, be careful in your interactions onchain. These TSS setup are used in various protocols.

English
7
9
49
1.7K
Printr
Printr@printr·
Dexscreener now surfaces every Printr token on Solana in one place Filter by prebonded or bonded, scan the full launch pipeline, and trade through whatever terminal you already use. Discovery just got a lot easier. Distribution never looked better on Printr
Printr tweet media
English
18
17
84
1.7K
SHILL GATES
SHILL GATES@imshillgates·
A lot of people are gonna be really salty when Pulsechain finally takes off.
English
33
5
120
1.4K
7
7@getr3kd·
Next 10M runner larping at 266k mcap.
English
12
4
29
792
VibraFinance™⭐️
VibraFinance™⭐️@VibraFinance·
I’ve listened to 4 hrs of streams/podcasts/alpha and it’s 8:30. I don’t think anyone else truly puts it 16+ hrs a day. If we don’t smash 5 different 100xs at minimum, I’ll close my acct and retire. I’m that confident in $HBAR $XLM $XRP $FLARE $QNT $DOVU $SHX $QUBIC are must holds
English
1
0
6
223
Printr Intern
Printr Intern@printrintrn·
Did you get your own employee badge yet, @printr Intern? 👀
Printr Intern tweet media
English
5
5
9
133
BIGWARZ
BIGWARZ@bigwarzeth·
"this KOL sold, that's why we dumped"
BIGWARZ tweet media
English
2
0
7
740
rowhale
rowhale@rowhale·
Start where you are. Use what you've. Do what you can!
English
6
1
22
374
Ian Heinisch
Ian Heinisch@ianheinischmma·
Crypto Bro’s waiting for Altcoin season!
English
33
7
66
1.5K
RH IS A DUM DUM
RH IS A DUM DUM@plsmaxi365·
RH telling folks it's basically the bottom here for crypto. Buckle up, you have been waiting through the kast 5 years of underperformance for these next 2 years. Make it count. $HEX $PDAI $ETH
GIF
English
2
1
13
366
TM
TM@TMtheOG·
i might drop another article soon
English
3
0
8
602
hey
hey@heydotlol·
need a hug
hey tweet media
English
1
0
5
219