Michael Saylor(Parody)

3.3K posts

Michael Saylor(Parody) banner
Michael Saylor(Parody)

Michael Saylor(Parody)

@saylor_elon

Just Follow Me For 1000x

Katılım Temmuz 2025
361 Takip Edilen205 Takipçiler
Michael Saylor(Parody) retweetledi
Austin Federa | 🇺🇸
Austin Federa | 🇺🇸@Austin_Federa·
Are you a market maker on Solana who wants (or doesn’t want) MCP? I’d love to have you on @ValidatedPod
English
11
13
65
19.1K
Michael Saylor(Parody) retweetledi
Jonas Schnelli
Jonas Schnelli@_jonasschnelli_·
Iran demanding $BTC for Hormuz tolls proves it: censorship-resistance IS the intrinsic value. - USD? Frozen by SWIFT. - Yuan? Beijing's control. - Stables? Issuer blacklists. - Gold? Try emailing it. Bitcoin is the only truly unstoppable, neutral money on earth.
Watcher.Guru@WatcherGuru

JUST IN: 🇮🇷 Iran to require ships passing through the Strait of Hormuz to pay tolls in Bitcoin, FT reports.

English
90
510
3.1K
204.9K
Michael Saylor(Parody) retweetledi
0xBossman
0xBossman@0xBossman·
Delusional optimism is the only way you’ll make it financially and mentally.
English
43
11
100
5.6K
Michael Saylor(Parody)
Michael Saylor(Parody)@saylor_elon·
Dont sleep on $Ø @VoidifyCTO #Privacy on @solana is no longer a narrative, its being built #Tornadocash level tech, DAO-driven ecosystem, real utility. � Altcoin Buzz Smart money accumulates before the crowd realizes This is early. This is asymmetric Miss it now, watch it later
Michael Saylor(Parody) tweet media
English
2
2
3
142
Solana Sensei
Solana Sensei@SolanaSensei·
What’s your biggest win this cycle?
English
195
6
281
15.4K
Rodney
Rodney@cryptojourneyrs·
Community challenge 👀🚨 The community that engages with this post THE MOST will get a full review + shoutout on today’s show! 2PM EST ⏰ FOLLOW +LIKE + REPOST + COMMENT! GOOD LUCK! 🍀
English
207
62
206
8.9K
Michael Saylor(Parody) retweetledi
Dankrad Feist
Dankrad Feist@dankrad·
Models becoming good at security will be good for crypto, I think. Over the next 1-2 years we can harden protocols to levels never seen before. Other industries will continue to rely more on security by obscurity, and fail to adapt fully to the new security standards, meaning more exploits over the years. It also means the next couple of years teams will have to be on high alert. You don't want your funds to be with any team that takes this lightly or is unresponsive. Cutting edge, high agency and integrity is the only way through.
English
27
34
262
24.5K
Michael Saylor(Parody) retweetledi
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
An update on what we're focusing on with @multisig in light of the Drift incident last week. What we're building now: 1. A proxy program for v4 that lets you opt in to killing durable nonces for a specific signer. This removes the ability for pre-signed transactions to sit indefinitely waiting to be executed. 2. A dedicated protocol management multisig program with configurable template policies and a UI you can run locally. Built for teams that need tighter governance controls over admin operations. 3. Exploring clear signing with intents so signers can verify exactly what a transaction does before approving it (cc @Redacted_Noah). What's already available on v4 and can be set up by your team today: – Timelocks. You can set these up in Settings. They create a mandatory delay between proposal approval and execution. – Signer permissions. You can assign Propose, Vote, and Execute rights separately, so not every signer has the same level of access. – Multisig nesting. You can set up configurations where eg two separate multisigs are signers on a third. Adding a layer of operational separation. -Minimal UI. An interface on top of v4 that you can run locally (github.com/Squads-Protoco…). If you're unsure about your current setup or want guidance on how to configure any of this, DM us.
Squads@multisig

Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.

English
18
36
213
33.9K
HTX
HTX@HTX_Global·
Agreements Made. 🤝 Crypto Market Reacts:
English
92
42
293
23K
Michael Saylor(Parody) retweetledi
Raydium
Raydium@Raydium·
Never stop clicking
Raydium tweet media
English
226
87
686
29K