pull down to refresh

I know that the evidence indicates exactly this but would it be too wild to imagine that low-entropy keys would be perfect cover for both a clever exploit and a shadowy actor?

  • Launch pool with cheapest input costs.
  • Vertical growth of pool during time when many unsuspecting hobbyists are mining
  • Pull rug
  • Send out pleas as a cost percentage as cover

What's the line at the end of The Usual Suspects, the greatest trick the devil pulled was convincing the world he didn't exist?

the greatest trick the devil pulled was convincing the world he didn't exist?

Like the "greatest" Bitfinex hack.... that end in creating tether.

reply
0 sats \ 5 replies \ @xz 12 Sep

My memory is so hazy on the never ending dubious hacks and rugs.
Love to explore that whole fiasco again one day.

Is that part of how Tether came to be?

reply

Bitfinex hack was in 2016. USDT was created in 2014.

reply

you have to study more about those events.
here a comprehensive list:

reply

that's not how chronology works lmao

reply

I am not talking about chronology... I am talking about how they prepared everything to became what they are today. The literal "creation" of it in 2014 it was just a preparation for they had planned for later.
You should look at the big picture, not focusing only on just 1 little square.

We are dealing with professional crooks not just amateurs...

reply

fair. your statement "the greatest Bitfinex hack.... that end in creating tether" had a different order of operations but these events could have still been related yeah. I will look at the links you shared (I did not see them before)

reply

deleted by author