pull down to refresh
0 sats \ 0 replies \ @ek 15 Dec 2023 \ parent \ on: How To Get Robbed 4 BTC And Be Ignored by Anycoin.cz and BTCPay team bitcoin
I feel like I should mention here that attackers most of the times know exactly who they should target. They are not going to waste their time with a target that may be too hard if there are tons of other targets that are easier to exploit.
For example, many people ask other people who got scammed:
It's selection bias: Most people who got scammed will think in hindsight: Why didn't I see all the red flags?
For example, scammers are using errors in their scam emails on purpose.
These errors are there to filter out exactly the people that are too smart anyway to get scammed. So only the "less smart" people actually contact the scammer so the scammer doesn't waste his time with people who are just going to waste his time.
Knowing stuff like this is the reason why I am very hesitant to connect https://delphi.market to mainnet since I might have to say one day: I wasn't smart enough myself to not get my funds drained, lol
Or I will at least put only very little funds first to see if there are some script kiddies who can already exploit my code - since I don't really know how secure my code is until it's live and ready to get exploited by real attackers.
But then again, can't be sure if I put more funds into it, if I am now going to attract new, more sophisticated attackers ...
we really need more security around LND nodes, lol