pull down to refresh

the malware swaps the address. so when you sign without double-checking the address, you're actually signing a tx to the attacker. you're then broadcasting that tx like you would normally. that's how anything signed leaves the browser or wallet.
0 sats \ 2 replies \ @adlai 6h
deleted by author
reply
0 sats \ 1 reply \ @ek 6h
yes, which is what I said because the malware has to swap the address before you sign
reply
0 sats \ 0 replies \ @adlai 6h
the details of my criticism depend on the UX of the target attacked by the payload. by my understanding, if the payload only detects and swaps addresses, then our entire discussion is the real scam, donating our sats to the rest of the community.
reply