Piteas

2K posts

Piteas banner
Piteas

Piteas

@piteasio

First and best dex aggregator on Pulsechain. Get best swap execution now! 🎴 https://t.co/PSn3msnRvS | 📜 https://t.co/0nIamIXiK5

Pulsechain Katılım Mayıs 2023
4.1K Takip Edilen7.1K Takipçiler
Sabitlenmiş Tweet
Piteas
Piteas@piteasio·
@ercwl termius is a gud prod 👍
English
0
0
4
284
Eric Wall
Eric Wall@ercwl·
sshing from my phone to run codex /goals on my desktop terminal is probably the coolest thing i’ve seen my devices do in my lifetime
Eric Wall tweet media
English
22
2
80
8.6K
PulseChain
PulseChain@PulseChain·
We decided to take a break from the expensive Twitter badge program after spending about $95,000 on it over the past 28 months. We added a couple billion impressions and want to thank everyone involved. Online conferences will continue. We beat the SEC, now it's time to beat the all-time high.
English
44
62
577
14.1K
Piteas
Piteas@piteasio·
all wallets. one swap hub. 🧙 we’ve rolled out a major upgrade to the wallet layer in Piteas v2.2.0. you can now seamlessly connect and use wallets like @MetaMask, @InternetMoneyio, @zkxwallet, @Rabby_io, @wallet, @TrustWallet, @reown_ and @WalletConnect. faster, smoother, and way more flexible than before. also, we made the already active security module visible during the swap review stage, and a sync security check is now applied for every request. take a look 👇 app.piteas.io (if things look off, just hit refresh once)
Piteas tweet media
English
9
29
163
3.7K
Piteas
Piteas@piteasio·
we’re grateful for your research, Alex. having you evaluate this as an outside perspective really mattered. and btw, today was actually our first chance to talk with you, and honestly, we were seriously impressed by your knowledge. like a big brain on Pulsechain 🥰 thanks...
Alex McWhirter@SIN3R6Y

You either supply chain attack a chrome extension, or hit them with malware in some way that force installs the extension. Then you just sit and wait. Watch what the user does, then inject the calldata. Or the malware can just modify an existing extension... either way. This recent attack is pretty specific to this one individual. 1. They crafted a call data response that closely matches the Piteas API. 2. They mined out an address that starts and ends similarly to the victims 3. They specifically ran that call data through the wallet in a way the UI would not normally do, but would fit the execution flow of a normal swap as to not raise any alarms. 4. the deadline parameters were set to give about a 10 min attack vector. This indicates they knew they could get the call data into the wallet, but not exactly sure on how much time they had to execute it. So they had to have it be able to survive for a window of time. I ran through the Piteas UI bundles, I tried to get the API to give me anything that would indicate it was compromised and I could not. I don't see anything that indicates Piteas itself is compromised. Now you can't rule out something like the Notepad++ hack where they were compromised, but the attackers were selectively hitting targets. But after talking to Piteas about it and seeing some logs, it seems unlikely. RAT's are really common, this smells like a RAT. Either in browser, or on the device. And they spent some time figuring out exactly how to do this one attack. my 2c anyways.

English
2
10
122
3.8K
Piteas
Piteas@piteasio·
@WhalePulse @MetaMask didn’t know that, so cool. if there’s any documentation we can use for integrating it into Piteas, please drop the link here and we’ll take a look as soon as possible.
English
0
0
2
122
Piteas
Piteas@piteasio·
We’ve submitted a feature request to @MetaMask for Pulsechain transaction simulation support. Showing token in / token out details on the confirmation screen for swaps would greatly improve user safety and help prevent phishing or misleading transaction flows. Hope to see this supported soon. community.metamask.io/t/support-tran…
English
29
79
353
9.1K
Piteas
Piteas@piteasio·
@RichardHeartWin + couldn’t find any concrete evidence pointing to a phising URL scenario, but if it was something embedded like an iframe or similar, then of course we wouldn’t be able to tell.
English
0
2
20
539
Piteas
Piteas@piteasio·
we ran a very serious post-mortem process and believe the source of this case was a direct attack targeting the user. everything is fine on our side, we’re just deeply saddened for our friend who suffered the loss. the systems are secure, but we’ll still add a few modules to the UI to help protect users from fake transactions. beyond that, there’s not much more that can realistically be done. 🙏
English
5
2
60
1.7K
Piteas retweetledi
Richard Heart
Richard Heart@RichardHeartWin·
The easiest way to get hacked in crypto is to "google" a website, click the fake as fuck link up top, that did SEO or paid per click to get there. Then connect your wallet and lose all your money. For some reason, people are pretending there's another way to do it. Some type of magical signing hack, lol. Like, bro, if there was someway to actually spam bullshit hacks transactions into peoples wallets, people would be losing their money far more often. There's no way to magically "inject" bullshit, scam transactions into someone's wallet, but for them connecting to a bad dapp. The only other, barely hackish way, is or someone to watch fake, scam transactions hitting their address in a block explorer, and just straight up send the fake address money. I'm happy to learn. Am I missing something?
English
87
291
1.4K
38K
Piteas
Piteas@piteasio·
thank you for your extremely kind and thoughtful words. unfortunately, having to deal with false claims is not something we’re experiencing for the first time, and it definitely won’t be the last. sooner or later, it may knock on your door too, and you explained that reality beautifully. we spent the last 24 hours investigating the case. a number of sharp developers were involved in that process as well, and most recently we went over many of the details with Alex from Hedron. we even received suggestions on what extra protective measures could be added as a precaution going forward. but this issue was not related to DNS, not RPC-related, not caused by an API exploit, and not contract-related either. it was simply malicious software directly targeting the user. being respectful should always be rule number one. competition creates advantages for everyone. so we’re genuinely grateful for your approach, and we wish you endless success with what you’re building!
English
0
3
65
923
Brandon - BuildTheTech.com
Brandon - BuildTheTech.com@BrandonR2R·
There’s a lot of noise around @Piteas right now, so I want to get folks grounded in reality. From what’s been shared, this does not look like an issue with their frontend or contracts. It looks like a user interacting with something the shouldn’t have, that happens across all of crypto, not just one platform. Elephant in the room: Piteas is switch.win direct competitor. Healthy competition is what actually makes this space better. If there was only one DEX, one aggregator, one team, you’d get slower innovation, worse execution, and less accountability. Competition forces everyone to: Improve routing optimize fees Move faster Build better products That benefits users.. Their existence pushes us to be sharper. And our existence pushes them to be better. That’s how we get better as a whole. What doesn’t help is turning every incident into a hit piece, especially when it’s not grounded in facts. That kind of behavior scares people away and makes the entire chain look unstable. If something is broken, call it out. Loudly. If it’s not, don’t hurt people. We’ve already had enough drama. PulseChain doesn’t need more drama…it needs builders competing at a high level and raising the standard together. That’s how you keep the ship afloat. Thanks
English
1
16
129
3.2K
Piteas
Piteas@piteasio·
@HEXMoon369 we ruled that possibility out because we spoke with the user directly. we’ve seen also plenty of cases where people pretend they got hacked to avoid taxes, but sadly this doesn’t look like one of those :(
English
0
0
1
26
HEXmoon369.pls🌚
HEXmoon369.pls🌚@HEXMoon369·
@piteasio Could this be a blatant opportunity to try and undermine your site (Piteas) and the lost funds were never lost but made to look like it. I smell a rat. Keep up the great work.
English
1
0
0
23
Piteas
Piteas@piteasio·
ignore the rumors going around about Piteas. if there had been an issue on our side, it would not have affected just one person, it would have affected everyone. we checked the system end to end and found neither a leak nor any unauthorized access. based on the post-mortem work we’ve done so far, and during this process we also stayed in direct contact with the victim to gather every detail, we can confirm that the user was directly targeted. the reason is simple: the signed transaction was pre-crafted and contains a wrap function that cannot be generated by the UI. on the app, wrap operations are executed by the wPLS contract, not by the router. this is also not the kind of malformed call that could have come from the API, and even if it had, the UI-side validation would still have rejected it. the attacker is using a vanity address. address patterns similar to the victim’s are usually part of mass attack methods, so this looks less like a one-off handcrafted attack and more like the byproduct of some spreading malware logic. beyond the device or the vpn being compromised, we don’t see another realistic scenario. and even the vpn angle looks weak, because doing this over TLS v1.3 is basically impossible, though we still can’t fully rule out some other kind of network-side issue. so at this point, our view is that malware on the victim’s device may have altered the response data of the request coming from the API directly inside the browser. in other words, the attacker may have embedded a script into the browser that waited for the right transaction flow and then replaced it with a fixed malicious call, likely with some form of self-delete behavior as well. we are doing everything we can to protect users. for more than a year now, despite barely generating enough revenue to cover expenses and despite all market conditions, we have continued to work here for the ecosystem. so please do not give attention to the usual paid voices who are known for tweeting for money and are now, once again, trying to smear Piteas for money too. even so, our team will still do its best to support the affected user however we can.
Piteas@piteasio

unfortunately, attacks on web3 touchpoints have increased a lot lately, and now users are being exploited through fake txs designed to target them directly. whether it’s Piteas or PulseX, Pulsechain or Ethereum, it doesn’t really matter which app or chain you’re on, because they send you pre-crafted calls based on the chain where your funds are and the app you use, then try to catch you with a blind sign. we urge everyone to stay careful and protect themselves from becoming the target of these growing attacks. our feeling is that DPRK may no longer be targeting just protocols, but users too. make sure your devices and your network or VPN are secure. stay safe.

English
18
26
177
13K
Piteas retweetledi
Piteas
Piteas@piteasio·
@MetaMask upvote the feature request post, please 🙃
English
3
5
47
1.8K
Piteas
Piteas@piteasio·
i’m saying let’s stay quiet, but you just keep making me talk... bro, maybe take a look at the exchange (bitunix) in the ref link on your bio first. nobody even knows for sure who the people behind your kyc and partnership are or what country they’re based in. and you still come here trying to question why we’re anon. maybe worry about the money sitting on the exchange you promote and get people signed up for first.
English
3
0
12
300
SHILL GATES
SHILL GATES@imshillgates·
If you're so proud of your product, put your name on it. Show your faces. I don't see how anyone can trust a product where the founders and developers won't even take credit for it and stand behind their work with their reputations. It's so strange. It raises so many red flags. I know you know this and even in this conversation you're being intentionally deceptive. Very telling.
English
2
0
2
230
SHILL GATES
SHILL GATES@imshillgates·
Don't you find it odd that a lot of the devs of the larger Pulsechain protocols are anon? This is very uncommon, especially for things like bridges and routers. These key infrastructure points have admin keys and require a huge amount of trust on behalf of users. What are they hiding? Why are these people not public? It's very strange and unsettling.
English
37
4
210
8.7K
Piteas
Piteas@piteasio·
lmao, same style of attack again with zero actual argument. you’re really earning that paycheck! Piteas does not hold, control, or transfer anyone’s funds. if you knew even a little bit of code or understood web3 at all, you wouldn’t be saying this stuff. i get that you’re ignorant, but i honestly don’t know where this confidence comes from. if the team had planned to do something malicious, they wouldn’t have waited 3 years for it and they would’ve done it when volume was peaking. keep fooling yourself. we’re not giving you any more engagement.
English
1
0
9
233
SHILL GATES
SHILL GATES@imshillgates·
I have not been paid to say I think that anonymous centralized entities should not be trusted. That is a core tenant of crypto, blockchain and decentralization. And it especially applies to the ones who refuse to reveal themselves...Because generally speaking, that's usually due to them planning to commit nefarious acts. There is no other reason for you to not put your name on your product. Its inexcusable that a centralized company's founders or developers are not public, especially when they are responsible for handling large sums of user funds. Its a massive red flag and I don't think anyone should trust platforms who do this with any real amount of their money. What do you have to hide?
English
2
0
2
279