Max Kaplan

4K posts

Max Kaplan

Max Kaplan

@maxekaplan

Recovering, exited founder and public company exec | fmr @solstrategies @orangefincrypto (acq) @krakenfx

United States Katılım Ocak 2012
964 Takip Edilen6.8K Takipçiler
Sabitlenmiş Tweet
Max Kaplan
Max Kaplan@maxekaplan·
Bit of an announcement Tomorrow marks my last day as CTO of @solstrategies It's been an absolutely incredible ride. From starting @orangefincrypto , to coming onto SOL Strategies, to being the first Solana focused company ever to get listed on Nasdaq, to being the staking provider for an ETF, to so much more, it's been an experience I wouldn't trade for the world. None of it would be possible without the amazing team I had the pleasure of interacting with. This includes @m_hbbrd , @Ehrls15 , @AfroMonkey404 , @coderigo , @TrilliumJohn and more that aren't on X, but appreciate them just as much. Thank you to all of you for being amazing to work with. Additionally, I wanted to give a shout out to the @darklakefi team that have already brought such amazing energy and ideas to the company in @vitorpy , @DuchessofSOL , @yesjess , and the rest of the team. I'm super excited to see what the rest of you build! Lastly, as far as the team goes, I'd like to also give a public shout out to @LeahWald , @TonyGuoga , and @moeadham . Thank you for bringing me on board, taking a chance on me, and teaching me many things I'll take with me for the rest of my life. In addition to the team, I'd like to shout all the investors and ecosystem teams I have had the pleasure of working with. There's far too many to name, and because I don't want to risk forgetting to include one, I won't name any. But please know if I have ever talked to you, I appreciate you 🙏. As for what's next, I'll continue to be involved in SOL Strategies as a consultant, helping to ensure everything operates smoothly and providing help in any place I can. Additionally, I plan on trying to find a happy balance between touching grass and experimenting with AI more 😀. My thoughts on Solana and crypto overall remain unchanged. If you are a builder on Solana and need (free) help with anything such as intros, fundraising, technical advice, etc, don't hesitate to reach out. If there is a way I can help you, I intend to do my best to do so. Thank you 🫶
English
25
5
158
8K
Max Kaplan
Max Kaplan@maxekaplan·
Keeping your shit off the internet removes ~95% of all vulnerabilities. Don’t just close ports. No publicly routable IPs if it doesn’t need one.
Cyber Security News@The_Cyber_News

🚨 OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack Source: cybersecuritynews.com/openclaw-chain… A chain of four critical vulnerabilities discovered in OpenClaw, one of the fastest-growing open-source platforms for autonomous AI agents, has left an estimated 245,000 publicly accessible server instances exposed to remote exploitation, credential theft, and persistent backdoor installation. Shodan and ZoomEye scans as of May 2026 reveal approximately 65,000 and 180,000 publicly accessible OpenClaw instances, respectively, totaling roughly 245,000 exposed servers. What makes this chain especially dangerous is that the attacker weaponizes the AI agent’s own privileges. #cybersecuritynews

English
0
0
7
1.2K
Max Kaplan
Max Kaplan@maxekaplan·
The best Solana FUD is here IMO (and the function above) #L82-L213" target="_blank" rel="nofollow noopener">github.com/anza-xyz/agave…
English
1
0
5
340
Max Kaplan
Max Kaplan@maxekaplan·
What part of the cycle is it when an apartment for rent comes with a Claude subscription?
Max Kaplan tweet media
English
2
0
5
497
Max Kaplan
Max Kaplan@maxekaplan·
@00_dawson_00 I would bet that if we took all the validators that are running firedancer and the web ui, >= 35% of them are just exposing an nginx server on the same host as the validator wide open to the internet
English
0
0
0
51
Dawson | Apyx
Dawson | Apyx@00_dawson_00·
@maxekaplan What is the "Anti-DevOps" crowd? Didn't even know that was a thing
English
1
0
1
23
Max Kaplan
Max Kaplan@maxekaplan·
“Anti-DevOps” crowd in shambles rn. Been warning against this stuff for years. “I just keep it simple and point an A record at my server. Nothing can go wrong.” This is an extremely unserious way to manage infra that no serious company does anywhere in the world. As one example of many: solstrategies.io/blog/protectin…
Cyber Security News@The_Cyber_News

🚨 Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks Source: cybersecuritynews.com/18-year-old-ng… A critical heap buffer overflow vulnerability, lurking in NGINX's source code since 2008, has been publicly disclosed. This vulnerability has been publicly disclosed, along with a working proof-of-concept exploit that can enable unauthenticated remote code execution (RCE) against one of the most widely used web servers in the world. Assigned a CVSS score of 9.2, CVE-2026-42945 resides in NGINX's ngx_http_rewrite_module. This engine powers URL rewriting and variable assignment in virtually every modern NGINX deployment. #cybersecuritynews

English
1
0
5
1.2K
Max Kaplan retweetledi
Jess 💫
Jess 💫@yesjess·
Idle SOL is a choice. STKESOL is Ranked the #1 most decentralized LST on @solana . On @kamino Multiply, earn ~7.03% APY, 7.7x leverage, and there's an extra 70 solana:stke7uu3fXHsGqKVVjKnkmj65LRPVrqr4bLG2SJg7rh distributed to depositors weekly. Or you could let your SOL just...sit. 🤷‍♀️
tielman@tielmane

🥇 Congrats @solstrategies — STKESOL takes #1 on the GDI with a 4.47. A new standard for measuring stake pool contribution to Solana's network security & decentralisation. SOL Strategies delegates algorithmically across dozens of validators — and the geographic spread shows. gdindex.app/pools/StKeDUdS… cc @laine_sa_

English
0
3
16
1.4K
Andrew Fitzgerald
Andrew Fitzgerald@apfitzge·
10k line change. local testing, straight to a mainnet (non-voting) node. crash after a minute. 1 line fix. Back and running solidly. Taking codex in small steps and reviewing each one is insane.
English
2
0
19
1.2K
Max Kaplan
Max Kaplan@maxekaplan·
Phoenix coded
Hyperliquid@HyperliquidX

Coinbase has announced its plan to activate AQAv2 on USDC as the treasury deployer, with Circle serving as the technical deployer responsible for CCTP and native cross-chain infrastructure. Both Coinbase and Circle have committed to stake HYPE to activate AQAv2. As part of this transition, Native Markets has agreed to terms granting Coinbase the right to purchase the USDH brand assets. With Coinbase, in its role as treasury deployer, sharing the vast majority of reserve yield revenue with the protocol, USDC will become the most aligned stablecoin on Hyperliquid. As a result, canonical outcome (HIP-4) markets will use USDC as the quote asset in a future network upgrade. User and builder feedback has been consistent that fragmentation leads to degraded experience; now, the community no longer needs to choose between liquidity and protocol alignment. The pioneering work of Native Markets in launching USDH as the first production-scale stablecoin sharing yield directly with a protocol in a purely onchain implementation made AQAv2 possible. The learnings and mechanics pioneered by USDH will live on in AQAv2. The Hyper Foundation will give grants to eligible HIP-3 deployers, HIP-1 deployers, and builders who integrated USDH, supporting teams through migration over the next months. These grants reflect an ongoing commitment to teams who choose to build on Hyperliquid and align with the protocol. USDH markets are fully functional but will sunset over time. USDH remains fully backed, with feeless conversions to USDC and fiat available to users during this transition.

English
0
1
9
723
miles
miles@wedtm·
just installed chrome
miles tweet media
English
6
0
24
1.4K
Max Kaplan retweetledi
tielman
tielman@tielmane·
🥇 Congrats @solstrategies — STKESOL takes #1 on the GDI with a 4.47. A new standard for measuring stake pool contribution to Solana's network security & decentralisation. SOL Strategies delegates algorithmically across dozens of validators — and the geographic spread shows. gdindex.app/pools/StKeDUdS… cc @laine_sa_
English
2
9
19
6.6K
Uri Klarman ⚔️
Uri Klarman ⚔️@uriklarman·
@maxekaplan I think you’re both saying the same thing HL did a 💯 phenomenal job getting retail love, which jumpstart distribution & MM-takers cycle and yes, fees aren’t that important at some level But that alone won’t keep HL ahead - only adding more killer product features will
English
1
0
1
206
Max Kaplan
Max Kaplan@maxekaplan·
I often agree with Toly, but in this case, I hardcore disagree. 1. HL is nowhere close to the best product. It can't even be accessed inside the US without a VPN, which immediately eliminates like 95% of the US population from using it, who aren't technical enough to use a VPN. Yes, the world is much bigger than the US, however there is no denying the US is a huge contributor to the global economy. Regardless of your position here, it's objectively true that if you have to use a VPN to use a particular product, it's not the best product for the TAM of an exchange. 2. HL's FE has tons of issues. No one I have ever talked to has particularly loved their interface. As just one example, builder deployed perps on Hyperliquid (ie: stock / commodity / "other" perps), are labeled on their FE as "HIP-3." ~99.99% (probably more) has no idea what HIP-3 is. Yes, Hyperliquid is more than just app.hyperliquid.xyz, however there's no denying that's where the majority of retail traffic is going. Hyperliquid is a fantastic product. I use it, and in full disclosure, I own HYPE. The point of this isn't to shit on Hyperliquid. However, what truly made Hyperliquid successful was their community, which mostly stems from their token. Owners of HYPE WANT to use Hyperliquid because they have a direct financial incentive to do so. MM's want to trade where retail is. An exchange with only MM's is basically worthless. Hyperliquid won retail with their token, which they did a fantastic, world class job at, that has never been matched in crypto. And because of that, many MM's trade there. Exchanges in many ways are commodities. If asset A trades on 10 different exchanges, at some point, fees become irrelevant as they all become sufficiently low enough and there's diminishing returns on going lower. Additionally, most users aren't seeking out the lowest cost venue which has been proven time and time again. Hyperliquid is a fantastic product, but not the best product. Hyperliquid's distribution is the best, and that is what is so heavily discounted, for whatever reason, on CT.
toly 🇺🇸@toly

@Niyi_0550 If the token is HL‘s differentiator, they will never get to binance levels. Product is 100% the most important thing

English
8
1
40
10.8K
Max Kaplan
Max Kaplan@maxekaplan·
@toly Yeah, to be clear, I was only commenting on the HL & Binance part. Would love nothing more than Phoenix to beat them. Cracked team I have a ton of respect for, and I plan to use Phoenix more
English
1
0
3
580
toly 🇺🇸
toly 🇺🇸@toly·
@maxekaplan I 100% get it, tokens are great. It’s gonna be up to the phoenix team if they ever do it. But they have to have a great product first. A token isn’t going to save a crappy product.
English
15
1
47
3.5K
Max Kaplan
Max Kaplan@maxekaplan·
I’ll never run models directly on my own laptop / phone no matter how good they get. Open weight, smaller models are great, and I am very optimistic they will improve and provide tremendous value to the world. However, direct inference without any monitoring / alerting is a nightmare waiting to happen. As open weight, smaller models improve, the level of sophistication of attacks possible is going to increase exponentially. An attacker can quite literally turn your device into their own openclaw. Good time to also think about your home network. All those IoT devices you have can be compromised as well, and a compromised IoT device can also compromise your laptop / phone if on the same network without a properly set up firewall. Local inference is not the main issue in the report. These types of attacks are possible no matter where the models are hosted. However, it’s worth noting that in many ways, you’re actually better off from a security perspective using a model hosted by one of the frontier labs than some model running directly on your phone / laptop. At some point in the future, I will definitely be doing my own inference on my own hardware. However, this will always be remotely on a permissioned network with massive amounts of security infrastructure around it. Ideally with something like openpolicyagent with tons of logging / alerting.
News from Google@NewsFromGoogle

The Google Threat Intelligence Group has detected the first known instance of a threat actor using an AI-developed zero-day exploit in the wild. While the attackers planned a wide-scale strike, our proactive counter-discovery may have prevented that from happening. This finding is part of our new report on AI-powered threats.

English
1
1
5
853
Max Kaplan
Max Kaplan@maxekaplan·
One of the nastiest issues I ever had to fix in prod was a Kafka cluster where a broker didn’t shut down gracefully (hardware failure) and was a nightmare to fix. Also back when Kafka depended on zookeeper. When stateful services like Kafka / a db don’t shut down gracefully and are doing 10k-1M+ messages / sec, you get all sorts of terrible corruption issues. Sucks what happened to coinbase but good write up.
rob@rwitoff

Yesterday @coinbase experienced a multi-hour service disruption affecting trading, exchange access, and balance updates. Here's our initial read from Coinbase engineering on what happened, how we recovered, and what we're addressing. At approximately 23:50 UTC on 2026-05-07, our monitoring detected cascading quote failures from internal services that triggered multiple Sev1 incidents that engineering immediately began investigating. Customer-facing impacts included spot trading, Prime, International and derivative exchanges. Root cause: a thermal event (cooling system failure) inside a subset of racks within a single building in AWS us-east-1. We run a primary replica of our exchange infrastructure in a single zone, consistent with industry standards to reduce latency. To prepare for failures like this, we maintain a distributed standby, but during this incident, failures in the primary zone that were designed to be isolated were not, extending the duration of our outage. The failure cascaded down two paths: 1. Multiple hardware components beneath our exchange’s matching engine failed, requiring recovery and failover 2. Distributed Kafka clusters that manage messaging across Coinbase systems failed to remain available, also requiring partition failovers to new hardware brokers with many TiBs of data After isolating the incident: automated tooling drained ~10 Kubernetes clusters worth of related workloads out of the affected zone to stabilize internal services. Most services were back to normal within ~30 minutes of diagnosis. The two things we couldn't automatically drain: the exchange (dedicated hardware and storage) and Kafka (managed service that was designed to be resilient to this, with unique problems). The exchange matching engine is the core system responsible for processing orders and maintaining order books. It is a distributed cluster and requires quorum to safely elect a leader and continue processing trading activity. During the incident, infrastructure-level constraints in the affected datacenter left only a subset of nodes healthy, preventing the cluster from reaching quorum. As a result, trading across Retail, Advanced, and Institutional exchanges were blocked. Recovery required our oncall and engineering teams to execute our disaster recovery plan, restore quorum safely, and validate system health under constrained infrastructure conditions. The team built, tested, deployed, and validated the fix while continuing to manage the broader incident. Kafka recovery was a much larger scale operation. Our primary managed Kafka partitions process many terabytes of data daily and are designed with resiliency guarantees for uninterrupted operation during a datacenter failure just like this. In this case, those guarantees failed and required manual recovery. We again relied on disaster recovery procedures to recover stuck partitions onto new hardware (brokers) that enabled us to safely bring x-service messaging back online across Coinbase. During the lag, customers saw delayed balance streams which resolved automatically once replication caught up. No data lost. Once the engine came back up as part of our standard runbooks, we re-opened markets carefully: all products to cancel-only mode first, audited product states, then moved all markets to auction mode, before restoring trading on Coinbase Exchange. What went right: the team. Incident response across the company came together within minutes, followed well-rehearsed playbooks and used secure automation tooling to recover all services. We have a strong, senior team at Coinbase that worked through rare failure modes to recover all services. To our customers: losing access to your account, even temporarily, is unacceptable. We know that. We're sorry, and we’ll publish a full root cause analysis in the coming weeks 🙏

English
1
1
11
2.4K
Max Kaplan
Max Kaplan@maxekaplan·
With $SOL above $90 again, can we all agree to stay off Zillow for a bit?
English
2
0
17
832