Zedzies

27K posts

Zedzies banner
Zedzies

Zedzies

@Zedzies

Tradfi refugee

Katılım Haziran 2020
813 Takip Edilen5.7K Takipçiler
Zedzies
Zedzies@Zedzies·
@nullpackets @Linksideup @ChadSteingraber Thats actually what happened in Australia through project Acacia. They used the Chainlink Runtime Environment to orchestrate all of the complex logic to settle on the XRPL. Its probably 95% value capture to Chainlink/5% capture to XRPL (or whatever chain)
English
0
0
2
34
Zedzies
Zedzies@Zedzies·
@nanook_777 $QNT doesn't even have a production ready product lol.
English
1
0
11
491
nanook
nanook@nanook_777·
What they're calling for is legally recognized finality through public authority standards. That's $QNT. Chainlink is an oracle. Different layer entirely.
DigitalOilMan@CrypticTexan

@RealAllinCrypto @chainlink The IMF literally warns against bridges with 'complex trust assumptions and weak governance'… that's Chainlink. What they're calling for is legally recognized finality through public authority standards. That's $QNT. Chainlink is an oracle. Different layer entirely.

English
3
0
9
1.1K
Zedzies
Zedzies@Zedzies·
Chainlink Labs is one contributor in the largest active developer community in the entire crypto space. Bitcoin has a fairly small developer community, with a cartel consisting of a few miners deciding core protocol changes, and thus Bitcoin is actually more centralized at both the protocol level (fewer developers contributing to the code base) as well as at the operational level. This wasn't always the case, but POW naturally leads to it given the economies of scale it naturally encourages.
English
0
0
0
32
Gavin Lowther
Gavin Lowther@gavinlowther·
Bitcoin Core, Knots. There's active development, just no CEO to dump tokens. P2P scaled it didn’t fail. Lightning, Fedimint, Ark. Base layer settlement was always the point. Id also argue there can only be one PoW. No competing chain has closed that gap in 15 years. PoS security is circular. The asset protects itself, so an attacker just buys the weapon & gets paid to hold it. PoW you have to burn real money. Bitcoin not needing a team to survive isn't a bug.
English
4
0
4
535
Zedzies
Zedzies@Zedzies·
Production economies of scale mean centralization over time. Also, do you even realize that the chief scientist of Chainlink Labs and author of the Chainlink whitepaper formalized Proof of Work 10 years before the Bitcoin whitepaper? Bitcoin wouldn't even exist without Ari Juels.
Zedzies tweet media
English
1
0
0
34
Zedzies
Zedzies@Zedzies·
@CantonNetwork this is precisely why I argued at the time of onboarding vote where Wormhole, CCIP and LZ were bundled together but needed to be assessed individually. Specifically, protocols and users know the security floor for CCIP and Wormhole, but can’t know it for LZ. Thus, each LZ integration/bridge must be assessed individually. Because Canton ‘reviewed and voted’ to allow *all* implementations of LZ, the protocol/validators would almost certainly be named in a lawsuit in the event of an exploit.
English
1
1
16
385
Pandasifu ⬢⏣⬡
Pandasifu ⬢⏣⬡@0xpandasifu·
Turtle, one of DeFi's largest LP network, is now repricing its LP deals based on the choice of the bridge. Monitoring resources required for configurable bridges will be immense. You can never take a snapshot in time on the DVN set up and quantify the risks Market is moving.
Turtle@turtledotxyz

Following the $292M LayerZero exploit, Turtle has updated its due diligence framework: • Assets relying on configurable, ad-hoc bridging are priced with a haircut • Cross-chain tokens integrated with @Chainlink CCIP are preferred The haircut accounts for the additional monitoring burden capital allocators carry when verifier configurations can shift ad hoc. CCIP's secure-by-default cross-chain infrastructure is the gold standard for institutional liquidity in internet capital markets. It lets allocators quantify and price risk with precision, and is the recommended solution for issuers. When issuers ship on secure-by-default infrastructure, Turtle can: • Eliminate single points of failure • Price risk without constant manual review • Compress time-to-deal • Quote on the most favorable terms Read the full updated framework:

English
1
6
44
3.3K
Zedzies retweetledi
Turtle
Turtle@turtledotxyz·
Following the $292M LayerZero exploit, Turtle has updated its due diligence framework: • Assets relying on configurable, ad-hoc bridging are priced with a haircut • Cross-chain tokens integrated with @Chainlink CCIP are preferred The haircut accounts for the additional monitoring burden capital allocators carry when verifier configurations can shift ad hoc. CCIP's secure-by-default cross-chain infrastructure is the gold standard for institutional liquidity in internet capital markets. It lets allocators quantify and price risk with precision, and is the recommended solution for issuers. When issuers ship on secure-by-default infrastructure, Turtle can: • Eliminate single points of failure • Price risk without constant manual review • Compress time-to-deal • Quote on the most favorable terms Read the full updated framework:
Turtle@turtledotxyz

x.com/i/article/2057…

English
19
33
178
45.2K
Gavin Lowther
Gavin Lowther@gavinlowther·
The distinction I see between $BTC and $LINK comes down to one thing: who controls the outcome. Bitcoin's future is not contingent on any company's decisions. LINK's success hinges entirely on Chainlink Labs' actions. Bitcoin meets standards across every relevant criteria: decentralization, fixed supply, no team that can dilute or redirect value away from holders. LINK's network is real, the use case is real, but governance is centralized, supply is concentrated, and retail holders are passengers in someone elses vehicle. You are betting on a private company's competence. LINK requires trusting a team, & I don't think retail is compensated fairly for that risk.
⬡ The Crypto Panda ⬡@TheLinkPanda

When data is presented without deeper knowledge you get this. $LINK tokenomics are widely misunderstood.

English
13
4
25
6K
Zedzies
Zedzies@Zedzies·
@HarrySpoelstra Its the unifying factor of chronic infections or extreme NOS/ROS conditions. Same thing happens in ME/CFS. Heinrich Kremer’s HIV model explained/predicted this two decades ago.
English
0
0
1
95
Harry Spoelstra
Harry Spoelstra@HarrySpoelstra·
Multi-omics analysis of long COVID (post-COVID-19 condition) reveals persistent mitochondrial dysfunction, suppressed oxidative phosphorylation, and immune dysregulation 🚨IMPORTANT INTERNATIONAL STUDY with strong mechanistic evidence: LONGC0VID is ONE core syndrome wearing different masks! ➡️Study Design: Multi-omics (transcriptomics, proteomics, metabolomics) integrated across Syrian hamster models and human cohorts, analysing tissues from acute SARS-CoV-2 infection through 12 months post-infection. ➡️Core Finding: - Persistent mitochondrial dysfunction is a dominant, conserved signature in Post-COVID Syndrome (PCS/long-COVID), - This includes sustained suppression of oxidative phosphorylation (OXPHOS), mitochondrial stress responses, and concurrent inflammatory pathway activation across species and tissues, ➡️Tissue-Specific Effects: - Skeletal muscle shows the strongest and most prolonged OXPHOS repression, directly linking to fatigue phenotypes, - Heart and kidney maintain OXPHOS suppression: lung exhibits prolonged inflammation with partial metabolic recovery, - Brain shows persistent cortical mitochondrial repression, with partial recovery in sensory regions, ➡️Human Data: - PBMC transcriptomes reveal sustained OXPHOS downregulation up to 12 months post-infection, independent of PCS status, - Serum proteomics in PCS patients specifically shows unresolved oxidative stress and immune activation compared to recovered controls, ➡️Interpretation: - Bioenergetic failure (mitochondrial repression) drives chronic immune dysregulation, creating a self-reinforcing cycle in PCS, - Human long-COVID is more heterogeneous than the hamster model, and mitochondrial dysfunction is likely central but not the only factor in every single case(!?) ‼️So, Long-COVID is not a vague or ill-defined post-viral syndrome. It is a single, systemic biological entity, a persistent disorder of mitochondrial failure and immune dysregulation that fails to resolve in many patients even one year after infection. ➡️LC= BIOENERGETIC COLLAPSE! This paper demonstrates that it operates as one core syndrome with distinct tissue-driven subtypes: the same underlying bioenergetic collapse and chronic inflammation manifest differently depending on which organs are most affected (muscle → fatigue, brain → cognitive issues, heart/lung/kidney → their respective symptoms). It is not dozens of unrelated conditions. It is ONE disease wearing different masks, as I've been defending for long! This has of course profound implications: it shifts diagnosis, research, and treatment away from chasing scattered symptoms toward unified therapies that target the common mitochondrial root cause. The BIOENERGETIC COLLAPSE is likely the central driver of debilitating fatigue and multi-organ dysfunction, and it demands immediate, focused therapeutic intervention!! Eagerly awaiting further confirmation! #AvoidSars2 #AvoidReinfections frontiersin.org/journals/immun…
Harry Spoelstra tweet media
English
13
90
236
12.7K
Riley Anders, MCAS
Riley Anders, MCAS@rileyanderz·
@Zedzies Totally. CD57 count was near the low end recently, not sure how indicative that is. What would you test?
English
1
0
1
36
Riley Anders, MCAS
Riley Anders, MCAS@rileyanderz·
The idea of activating CD8+ T and NK cells is what worries me a bit, though I know it is much more complicated than that, especially when I don't know (or really have any way of knowing) exactly what is awry with my immune system (besides simple MCAS). x.com/rileyanderz/st…
Riley Anders, MCAS tweet media
Riley Anders, MCAS@rileyanderz

I've become paranoid of anything that can potentially stimulate/inflame my immune system. And thus skeptical of using Thymosin Alpha 1 for my particular MCAS (partially because I don't fully understand its mechanism). But the anecdotes are decidedly positive on balance.

English
2
0
13
1.5K
Zedzies retweetledi
Julia Marie
Julia Marie@julia_doubleday·
The WHO and CDC have absolutely no one to blame but themselves if that happens. Spent the last 4 years stigmatizing disease control, encouraged ppl to maximize disease spread, forced return to offices, cut disease monitoring budgets, reduced PPE, didn’t clean the air
The Hill@thehill

Former CDC director on Ebola outbreak: ‘I suspect this is going to become a very significant pandemic’ thehill.com/policy/healthc…

English
22
818
4.9K
198.9K
Gold Man Crussy
Gold Man Crussy@CountCrypto42·
Chainlink $LINK wins the marines were right Sergey cucked the entire industry and CT didn’t even notice because they’re all .eth midwit frauds who don’t even understand what the FUCK is happening in their own field of expertise 🤣 🤣 🤣 🤡 SERGEY FUCKS VITALIK IN THE ASS 🤣
Gold Man Crussy tweet media
English
5
6
47
1.3K
Jon Douglas
Jon Douglas@atranscendedman·
Nordic cohorts, 80,726 people, found genetic liability for neuroticism, depression, and ADHD was linked to higher long COVID risk, likely reflecting shared symptom patterns rather than a simple immune cause. thelancet.com/journals/eclin…
English
2
8
25
2.9K
Spade
Spade@SpadesHQ·
Your developer being socially engineered into cloning a malicious GitHub repo & dropping malware onto his or her machine is what initially enabled this exploit. Your own incident report literally includes that in the attack timeline. Yet, almost none of the corrective actions in the post mortem focus on the human element whatsoever. (OpSec practices, security training, device policies, phishing training, workstation isolation, or operational awareness.) Instead, your response is centered around the technical exploit & DVN configuration changes. (Which is ironic because you originally framed it as a Kelp config issue) LZ’s security model is only as strong as the humans providing it. It doesn’t matter whether you scale the DVN to 5 attestors or 100 if the operators themselves are vulnerable to social engineering by regimes halfway across the globe. The only thing you are doing is maximizing the trust assumptions, while ignoring the root issue.
LayerZero@LayerZero_Core

We’re sharing our completed post-mortem on the April 18th incident, prepared with @Mandiant and @CrowdStrike. We are publishing both an executive summary and the full report at the link below. Over the past four weeks, we’ve worked with hundreds of partners to help them understand their current security posture, and harden it where appropriate. We’ll continue this work, alongside taking additional proactive steps for the benefit of not only our partners, but also the ecosystem as a whole. We want to extend our thanks to our partners for their support and patience this past month. There’s a reason that over $12 billion has moved across the network in the past four weeks, and why the world’s most valuable asset issuers have stood by our side: they believe in us, in what the LayerZero protocol has to offer, and in the value of modular, isolated, application-controlled security. The work continues. And we look forward to continue showing up for the applications that trust us with their business, as well as the broader ecosystem. layerzero.network/blog/layerzero…

English
7
9
79
10.5K
Zedzies
Zedzies@Zedzies·
@nullpackets Whatever happened to the decentralized github project that joined BUILD?
English
1
0
0
128
run ⬡ the ⬡ juels
run ⬡ the ⬡ juels@nullpackets·
you know what.....
GIF
Evan Luthra@EvanLuthra

🚨A HACKER GROUP JUST STOLE 4,000 OF GITHUB'S OWN PRIVATE REPOSITORIES.. PUT THEM UP FOR SALE FOR $50,000.. AND THE WAY THEY GOT IN IS THE SCARIEST PART.. They didn't hack GitHub's servers.. They poisoned a VS Code extension.. One GitHub employee installed it.. And the attackers walked through the front door using the employee's own credentials.. The group calls themselves TeamPCP.. They name their malware after the sandworms from Dune.. And they've been running the most sophisticated supply chain attack campaign in cybersecurity history.. Here's how the whole thing unfolded.. In March.. They poisoned Trivy.. One of the most trusted security scanners in the world.. Used by over 10,000 development workflows globally.. They injected credential-stealing malware into Trivy's official GitHub Action.. The malware ran silently BEFORE the security scan.. So every log showed "scan completed successfully" while the malware was stealing AWS keys, SSH credentials, database passwords, and Kubernetes tokens in the background.. It took Aqua Security 5 days to fully remove them.. Using the stolen credentials.. They breached Cisco Systems.. Cloned over 300 private repositories.. Including source code for unreleased AI products.. And repositories belonging to Cisco's customers.. Major banks.. Government agencies.. BPO firms.. In April.. They hit Checkmarx.. Another security vendor.. Poisoned 5 official Docker images in 83 minutes.. The scanner worked perfectly.. It just silently sent all your secrets to the attackers.. That automatically cascaded into Bitwarden.. The password manager.. Their CI/CD system pulled the poisoned Docker image.. And the attackers injected malware into Bitwarden's official CLI package published on npm.. One compromised security scanner poisoned a password manager.. Automatically.. No human involved.. In May.. They hit TanStack.. Libraries downloaded millions of times per week.. 84 malicious package versions across 42 packages.. And here's the terrifying part.. The malware scraped the raw memory of GitHub's build servers.. Extracted authentication tokens.. Used those tokens to bypass two-factor authentication.. And then published the infected packages with completely valid cryptographic signatures.. Every security verification tool on earth said the packages were legitimate.. Because they were signed by the real pipeline.. Using real keys.. The attackers just happened to be inside the pipeline when it signed.. They defeated the entire trust model of modern software supply chains.. The same week they hit the Nx Console VS Code extension.. 2.2 million installations.. The malware specifically targeted Claude Code configurations.. Hunting for AI assistant credentials.. That's a first.. Supply chain malware designed to steal your AI's access keys.. Then on May 19.. They revealed the GitHub breach.. 4,000 internal repositories.. Listed for sale at $50,000.. With a warning.. "If nobody buys it.. We leak everything for free".. Their malware is self-propagating.. Once it infects one package.. It automatically finds every other package that developer maintains.. Steals the publish tokens.. And infects all of them.. Then those packages infect the next developer.. And the next.. It jumps between npm and PyPI automatically.. The group doesn't even do the extortion themselves.. They sell stolen credentials to ransomware gangs.. One gang used TeamPCP's data to threaten Cisco with leaking FBI and NASA personnel records.. And the scariest part of all.. They didn't break any encryption.. They didn't find any zero-days.. They exploited the fact that the entire software industry blindly trusts its own build tools.. Every security scanner.. Every Docker image.. Every VS Code extension.. Every GitHub Action.. Is a potential weapon if someone poisons it upstream.. And right now.. Nobody can tell the difference between a legitimate build and a compromised one.. Because the compromised ones have valid signatures too.

English
1
0
9
766