TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

153k Ether Stolen in Parity Multi-Sig Attack

943 pointsby campbelltownalmost 8 years ago

60 comments

int_19halmost 8 years ago
Just skimming through the Solidity docs, I see a lot of unwise decisions there aside from the weird visibility defaults.<p>All state is mutable by default (this includes struct fields, array elements, and locals). Functions can mutate state by default. Both are overridable by explicit specifiers, much like C++ &quot;const&quot;, but you have to remember to do so. Even then, the current implementation doesn&#x27;t enforce this for functions.<p>Integers are fixed-size and wrap around, so it&#x27;s possible to have overflow and underflow bugs. Granted, with 256 bits of precision by default that&#x27;s harder to do than usual... but still pretty easy if you e.g. do arithmetic on two inputs.<p>Operators have different semantics depending on whether the operands are literals or not. For example, 1&#x2F;2 is 0.5, but x&#x2F;y for x==1 and y==2 is 0. Precision of the operation is also determined in this manner - literals are arbitrary-precision, other values are constrained by their types.<p>Copy is by reference or by value depending on where the operands are stored. This is implicit - the operation looks exactly the same in code, so unless you look at declarations, you don&#x27;t know what it actually does. Because mutability is pervasive, this can can have far-reaching effects.<p>Map data type doesn&#x27;t throw on non-existing keys, it just returns the default value.<p>The language has suffixes for literals to denote various units (e.g. &quot;10 seconds&quot; or &quot;1000 ether&quot;). This is purely syntactic sugar, however, and is not reflected in the type system in any way, so &quot;10 second + 1000 ether&quot; is valid code.<p>Statements allow, but do not require, braces around bodies. This means that dangling &quot;else&quot; is potentially an issue, as is anything else from the same class of bugs (such as the infamous Apple &quot;goto fail&quot; bug).<p>Functions can be called recursively with no special effort, but the stack size is rather limited, and it looks like there are no tail calls. So there&#x27;s the whole class of bugs where recursion depth is defined by contract inputs.<p>Order of evaluation is not defined for expressions. This in a language that has value-returning mutating operators like ++!<p>Scoping rules are inherited from JS, meaning that you can declare variables inside blocks, but their scope is always the enclosing function. This is more of an annoyance than a real problem, because they don&#x27;t have closures, which is where JS makes it very easy to shoot yourself in the foot with this approach to scoping.
评论 #14810090 未加载
评论 #14811300 未加载
评论 #14811313 未加载
评论 #14814988 未加载
评论 #14810094 未加载
评论 #14810086 未加载
评论 #14810175 未加载
评论 #14814105 未加载
评论 #14810642 未加载
评论 #14810886 未加载
评论 #14812218 未加载
评论 #14810082 未加载
评论 #14819248 未加载
评论 #14818656 未加载
评论 #14814848 未加载
评论 #14810204 未加载
评论 #14811582 未加载
earlzalmost 8 years ago
Here&#x27;s the root error I believe: <a href="https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;blob&#x2F;master&#x2F;js&#x2F;src&#x2F;contracts&#x2F;snippets&#x2F;enhanced-wallet.sol#L216" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;blob&#x2F;master&#x2F;js&#x2F;src&#x2F;cont...</a><p>The initWallet function should have been marked internal, but was instead not marked. Unmarked functions default to public in Solidity, so anyone can call that function and reinitialize the wallet to be under their control
评论 #14809172 未加载
评论 #14807994 未加载
评论 #14808632 未加载
评论 #14808046 未加载
评论 #14808037 未加载
评论 #14808000 未加载
评论 #14808026 未加载
评论 #14808060 未加载
评论 #14808047 未加载
评论 #14808837 未加载
评论 #14808135 未加载
评论 #14809987 未加载
评论 #14809954 未加载
评论 #14810412 未加载
评论 #14809784 未加载
评论 #14808157 未加载
finnhalmost 8 years ago
I&#x27;ve posted this before [0], but it&#x27;s still apropos regarding the foolishness that is Ethereum.<p>[Ethereum] only makes sense if all of the following obtain:<p>(a) the code is 100% bug-free (b&#x2F;c accidents cannot be rewound)<p>(b) all code-writers are 100% honest (their code does what they say)<p>(c) all contract participants are 100% perfect code readers (so as to not enter into fraudulent contracts)<p>(Strictly speaking, only one of (b) and (c) needs to be true).<p>None of these conditions will ever obtain.<p>[0] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14471465" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14471465</a>
评论 #14807930 未加载
评论 #14808136 未加载
评论 #14807991 未加载
评论 #14808494 未加载
评论 #14811562 未加载
评论 #14810559 未加载
评论 #14808076 未加载
评论 #14807973 未加载
aresantalmost 8 years ago
From the post mortem (1) -=&gt;<p>- A hacker managed to exploit a ICO multisig wallet vulnerability and drain 44,055 ETH - $9,119,385 at present.<p>- A white hat showed up and &quot;saved&quot; 377,000 ETH - $78,039,000 !!! - by draining other accounts.<p>I get the &quot;see cryptos are too insecure &#x2F; it&#x27;s a pyramid &#x2F; it&#x27;s a bubble &#x2F; ICOs are scams &#x2F; etc&quot; arguments.<p>But holy shit turning a world currency into the wild west - for better or worse - is going to be disruptive, period.<p>That $10m out the window is like a Series A for a nefarious hacker with deep crypto skills, what does this success embolden or create?<p>I can only imagine the debacles that we have to look forward to, and I say that in full support of and as a long term believer in both blockchain and cryptocurrencies.<p>(1) <a href="https:&#x2F;&#x2F;press.swarm.city&#x2F;parity-multisig-wallet-exploit-hits-swarm-city-funds-statement-by-the-swarm-city-core-team-d1f3929b4e4e" rel="nofollow">https:&#x2F;&#x2F;press.swarm.city&#x2F;parity-multisig-wallet-exploit-hits...</a>
评论 #14810274 未加载
评论 #14808536 未加载
doeneralmost 8 years ago
&quot;my favorite part of this latest ICO hack is that it appears to have gone to same wallet as the dao hack .....&quot;<p><a href="https:&#x2F;&#x2F;mobile.twitter.com&#x2F;IamNomad&#x2F;status&#x2F;887776981777092613?ref_src=twsrc%5Etfw&amp;ref_url=https%3A%2F%2Fredcursor.net%2F" rel="nofollow">https:&#x2F;&#x2F;mobile.twitter.com&#x2F;IamNomad&#x2F;status&#x2F;88777698177709261...</a><p>&quot;incredible plot twist: whitehat hacker supposedly saved most tokens from being stolen using the same vuln.&quot;<p><a href="https:&#x2F;&#x2F;mobile.twitter.com&#x2F;bcrypt&#x2F;status&#x2F;887775417406431232?ref_src=twsrc%5Etfw&amp;ref_url=https%3A%2F%2Fredcursor.net%2F" rel="nofollow">https:&#x2F;&#x2F;mobile.twitter.com&#x2F;bcrypt&#x2F;status&#x2F;887775417406431232?...</a><p>&quot;Multisig wallets affected by this hack: - Edgeless Casino (@edgelessproject) - Swarm City (@swarmcitydapp) - æternity blockchain (@aetrnty)&quot;<p><a href="https:&#x2F;&#x2F;mobile.twitter.com&#x2F;maraoz&#x2F;status&#x2F;887755889897295872?ref_src=twsrc%5Etfw&amp;ref_url=https%3A%2F%2Fredcursor.net%2F" rel="nofollow">https:&#x2F;&#x2F;mobile.twitter.com&#x2F;maraoz&#x2F;status&#x2F;887755889897295872?...</a>
评论 #14808277 未加载
cl0rksteralmost 8 years ago
A much more useful explanation: <a href="https:&#x2F;&#x2F;press.swarm.city&#x2F;parity-multisig-wallet-exploit-hits-swarm-city-funds-statement-by-the-swarm-city-core-team-d1f3929b4e4e" rel="nofollow">https:&#x2F;&#x2F;press.swarm.city&#x2F;parity-multisig-wallet-exploit-hits...</a>
评论 #14808023 未加载
评论 #14808084 未加载
ericbalmost 8 years ago
As Charlie Lee said:<p>If the creator of Solidity, Gavin Wood, cannot write a secure multisig wallet in Solidity, pretty much confirms Ethereum is hacker paradise.<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;SatoshiLite&#x2F;status&#x2F;887781929726038016" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;SatoshiLite&#x2F;status&#x2F;887781929726038016</a>
评论 #14810631 未加载
评论 #14811419 未加载
joshschreuderalmost 8 years ago
Let&#x27;s play hypotheticals.<p>If you were the attacker and you now have the ETH in your wallet, how do you cash out without anyone identifying you and maximising your profits?<p>Also has the attacker broken a law by exploiting a bug in the contract?
评论 #14811181 未加载
评论 #14808151 未加载
评论 #14808164 未加载
评论 #14809248 未加载
评论 #14808104 未加载
评论 #14808592 未加载
评论 #14808119 未加载
评论 #14811139 未加载
评论 #14808684 未加载
notsofastbuddyalmost 8 years ago
Parity shipped with a built-in Solidity contract to implement multi-sig wallets. That contract had a vulnerability that is now being exploited.<p>Importantly, the contract is not part of the Ethereum protocol, so other implementations and non-multi-sig Parity wallets are safe.
评论 #14809328 未加载
sna1lalmost 8 years ago
<a href="https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba238464159892252d3a" rel="nofollow">https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba2384641...</a> -- white hat group exploited the vuln and are holding people&#x27;s crypto for them.
评论 #14808068 未加载
matt_wulfeckalmost 8 years ago
I&#x27;m sure they&#x27;ll just hard fork again. And nobody cares because ethereum isn&#x27;t actually being used for anything real, just a bunch of enthusiasts trying to get rich.
评论 #14808421 未加载
评论 #14808223 未加载
pietrofmaggialmost 8 years ago
This is the most useful explanation I&#x27;ve found about the vulnerability so far: <a href="https:&#x2F;&#x2F;blog.zeppelin.solutions&#x2F;on-the-parity-wallet-multisig-hack-405a8c12e8f7" rel="nofollow">https:&#x2F;&#x2F;blog.zeppelin.solutions&#x2F;on-the-parity-wallet-multisi...</a><p>The explanation is a bit scary about what actually ended up in parity code:<p><i>The wallet contract forwards all unmatched function calls to the library using delegate call... This causes all public functions from the library to be callable by anyone, including initWallet, which can change the contract’s owners.</i><p>Edit: formatting
icelanceralmost 8 years ago
Black hat hackers nabbed $31MM in ETH. Not a bad payday due to a coding error.<p><a href="https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0xb3764761e297d6f121e79c32a65829cd1ddb4d32" rel="nofollow">https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0xb3764761e297d6f121e79c32a6582...</a>
评论 #14808127 未加载
lawrenceyanalmost 8 years ago
Silver lining: <a href="https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba238464159892252d3a" rel="nofollow">https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba2384641...</a><p>Looks like about +300,000 ether was able to be drained before it could be stolen thanks to a white hat group.
评论 #14808812 未加载
djhworldalmost 8 years ago
On the parity website they state the following<p>&gt; Every single line in our codebase is fully reviewed by at least one expert developer (and routinely two or more) before being placed in the main repository. We strive for excellence; static code checking is used on every compile to cut out bad idioms. Style is enforced before any alteration may be made to the main repository. Continuous integration guarantees our codebase always compiles and tests always pass.
评论 #14826888 未加载
dvccalmost 8 years ago
Can someone explain how immutable contracts get updated? From what I understand you can have one contract forward requests to another, and you can use some storage in the forwarding contract to determine the real target contract. But why would someone participate in a contract that is mutable?<p>I guess I am just wondering how this contract can be updated, given its on the blockchain and considered immutable.
评论 #14808436 未加载
评论 #14809380 未加载
nkriscalmost 8 years ago
Just thinking hypothetically here as a coin novice: could a bug like this theoretically have been implemented intentionally? If the code is the law, and the code is sufficiently complex, couldn&#x27;t it be feasible to dupe people?
评论 #14808644 未加载
评论 #14809710 未加载
swamp40almost 8 years ago
The begging in the comments section, along with their wallet ID&#x27;s, looks like a glimpse of the internet 100 years into the future.
o-almost 8 years ago
I believe from looking at the fix [0] I was able to trace back the origin of the bug. This is my (unverified) theory. Can anybody familiar with serpent confirm?<p>There is a catch-all [1] function in the public API (why???) of the wallet contract which uses delegatecall to delegate to the library class.<p>&quot;In a similar way, the function delegatecall can be used: the difference is that only the code of the given address is used, all other aspects (storage, balance, ...) are taken from the current contract.&quot; [2] (again, WHY???)<p>So calling through this catch-all function the &quot;internal&quot; modifier on &quot;initMultiowned&quot; does apparently not prevent it from being called, since the delegation happens from a function inside Wallet.<p>So the &quot;attack&quot; is to just tell the wallet to reset its owners to myself. This would be so embarrassingly trivial, that it&#x27;s more like picking the money up from the floor, than a &quot;heist&quot;.<p>This wallet contract is insane and the programming language too. Why would a language for such a critical application have such super unsafe constructs? This can&#x27;t be true. Please, serpent community, talk to your local PL people!<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;pull&#x2F;6103&#x2F;files" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;pull&#x2F;6103&#x2F;files</a> [1] <a href="https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;blob&#x2F;02d462e2636f1898df3e7556364260c594b112e6&#x2F;js&#x2F;src&#x2F;contracts&#x2F;snippets&#x2F;enhanced-wallet.sol#L426" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;blob&#x2F;02d462e2636f1898df...</a> [2] <a href="https:&#x2F;&#x2F;solidity.readthedocs.io&#x2F;en&#x2F;develop&#x2F;types.html#address" rel="nofollow">https:&#x2F;&#x2F;solidity.readthedocs.io&#x2F;en&#x2F;develop&#x2F;types.html#addres...</a> [3] <a href="https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;blob&#x2F;02d462e2636f1898df3e7556364260c594b112e6&#x2F;js&#x2F;src&#x2F;contracts&#x2F;snippets&#x2F;enhanced-wallet.sol#L107" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;blob&#x2F;02d462e2636f1898df...</a>
jonduboisalmost 8 years ago
The problem with Ethereum is that it&#x27;s just way too complex. The more complex something is, the more bugs and vulnerabilities there are going to be.
niahmiahalmost 8 years ago
Let me guess... another hard fork to undo this.
评论 #14808056 未加载
评论 #14811236 未加载
评论 #14807877 未加载
评论 #14807896 未加载
ericbalmost 8 years ago
No rollback this time. The chain with this hack must have the longer Proof-Of-Vitalik.<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;VitalikButerin&#x2F;status&#x2F;887782650026631168" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;VitalikButerin&#x2F;status&#x2F;887782650026631168</a>
theptipalmost 8 years ago
Can someone explain to me why you would want a smart contract for multi-sig? This is a feature that can be implemented easily off-chain, i.e. using split keys (Bitcoin has had this approach for some time).<p>Seems like having this complex logic on-chain is asking for it to be exploited.
tudorwalmost 8 years ago
Entropy, not something you want from a currency, also, paper money is not magic, it&#x27;s a network of trust. I think block chain applications are out there, I just don&#x27;t think cryptographic currencies are their best use.
abhi3almost 8 years ago
For some context: <a href="http:&#x2F;&#x2F;www.coindesk.com&#x2F;30-million-ether-reported-stolen-parity-wallet-breach&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.coindesk.com&#x2F;30-million-ether-reported-stolen-par...</a>
e79almost 8 years ago
The vulnerability was extremely simple, as suggested by the three keyword-long patch. I&#x27;ve written about this and other Solidity&#x2F;EVM bugs from a technical perspective, if anybody is curious:<p>- <a href="https:&#x2F;&#x2F;ericrafaloff.com&#x2F;parity-multi-sig-contract-vulnerability&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ericrafaloff.com&#x2F;parity-multi-sig-contract-vulnerabi...</a><p>- <a href="https:&#x2F;&#x2F;ericrafaloff.com&#x2F;analyzing-the-erc20-short-address-attack&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ericrafaloff.com&#x2F;analyzing-the-erc20-short-address-a...</a><p>I think at least a big part of the solution to these security problems is two-fold:<p>- More secure conventions. All of the gotchas in Solidity make for a bad time. Even non-security bugs create a bad developer experience. Opting into private functions by default<p>- More code review. Engineers need to be diligent or hire security professionals who are (I&#x27;m one).
ericfrederichalmost 8 years ago
Is this even illegal? Or just frowned upon? It seems this is just one big game, you find the weakness and you profit.
评论 #14815088 未加载
rboydalmost 8 years ago
you can see that this is also effecting tokens. check the whitehat effort (Token Transfers &#x2F; View Token Balances) on this wallet <a href="https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba238464159892252d3a#tokentxns" rel="nofollow">https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba2384641...</a>.<p>$30M worth of BAT, $26M ICONOMI, $17M CFI, $1.4M EOS<p>historic episode here which is sure to spur many a conversation about what disclosure means in the blockchain era.
redmalmost 8 years ago
The blog announcement from Parity:<p><a href="https:&#x2F;&#x2F;blog.parity.io&#x2F;security-alert-high-2&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.parity.io&#x2F;security-alert-high-2&#x2F;</a>
ericbalmost 8 years ago
Things like this are why I think Tezos, when&#x2F;if it comes out, has a bright future. I want a formal proof for any contract I use with real-money.
评论 #14813695 未加载
jamespittsalmost 8 years ago
Helpful information for users potentially affected by this issue:<p>- The vulnerability is in Parity&#x27;s &quot;enhanced&quot; multi-sig contract<p>- This affects Parity 1.5 and later<p>- Parity 1.5 was released on January 19, 2017 (have you created multi-sigs in Parity since then?)<p>- The canonical multi-sig contract used in Mist &#x2F; Ethereum Wallet does NOT have this vulnerability<p>- 0x1db is a community &quot;white hat&quot; sweep effort and not an attacker (See: <a href="https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba238464159892252d3a" rel="nofollow">https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba2384641...</a> )
codewizalmost 8 years ago
The bug in the wallet contract was fixed one hour ago with this commit: <a href="https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;pull&#x2F;6102&#x2F;files&#x2F;e06a1e8dd9cfd8bf5d87d24b11aee0e8f6ff9aeb" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;pull&#x2F;6102&#x2F;files&#x2F;e06a1e8...</a><p>Parity bug: <a href="https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;pull&#x2F;6102" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;paritytech&#x2F;parity&#x2F;pull&#x2F;6102</a>
okreallywtfalmost 8 years ago
In reading the comments I had forgotten what DSL stood for and had to look it up and it usually means something other than intended here, to save anyone else the trouble its Domain Specific Language.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Domain-specific_language" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Domain-specific_language</a>
kenseyalmost 8 years ago
The great thing about reading this comment thread is that I basically already read it a couple of weeks ago, because a friend of mine (David Gerard, of Wikipedia, RationalWiki and Rocknerd Internet fame) let me preview his forthcoming e-book _Attack of the 50-Foot Blockchain_. There&#x27;s a whole section in there about smart contracts, Ethereum, and The DAO that goes over much of what commenters here have mentioned (&quot;non-reversibility, till it&#x27;s our money at stake&quot;, the requirement that everyone write and read code perfectly, the problems with the very idea of immutability in contracts, etc.)<p>If people are interested, it&#x27;s on Amazon: <a href="http:&#x2F;&#x2F;amzn.to&#x2F;2trOjJS" rel="nofollow">http:&#x2F;&#x2F;amzn.to&#x2F;2trOjJS</a> (I have no financial interest in it, but I bet a lot of people in this thread would enjoy reading it and&#x2F;or writing long diatribes on why he is wrong about everything in it.)
评论 #14808915 未加载
abhi3almost 8 years ago
That&#x27;s like 30 Million USD at current prices? This is close to the DAO hack in USD value, not another fork now surely?
评论 #14807875 未加载
评论 #14807898 未加载
评论 #14807953 未加载
redmalmost 8 years ago
I&#x27;m not sure why everyone is piling on Solidity. At the end of the day, bugs happen in all languages, to all programmers eventually, and if you want to point the finger, it has to be at Parity.<p>If anything, it shows there needs to be a better process for peer review and some defaults in Solidity should be changed for security.
评论 #14812883 未加载
coinmealmost 8 years ago
Better techniques are required. Solidity is clearly not ready to be used to secure billions of dollars that can be anonymously stolen in an instant. Fuzz testing should be an absolute minimum. Formal proofs, and a simpler language should be the ultimate goal.<p>Hopefully the ethereum foundation takes note because this problem is not going away, and they are responsible for 20B$ market cap of value. I realise that ethereum is still young but they have chosen to build a product that can be used in a multitude of ways without enough thought about how to keep the value secure. I wouldn&#x27;t even know where to start when deciding whether it&#x27;s safe to use a smart contract, and I understand the concepts well. If ethereum is ever going to grow into it&#x27;s current market cap if will have to be safer for use by everybody.
ateevchopraalmost 8 years ago
77 Million were rescued by the white hackers and stored.<p><a href="https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba238464159892252d3a" rel="nofollow">https:&#x2F;&#x2F;etherscan.io&#x2F;address&#x2F;0x1dba1131000664b884a1ba2384641...</a>
samstavealmost 8 years ago
Forgive me for being harsh:<p>Why is there no &quot;pen-test&quot; phase to any crytocurrency which hits the market.<p>So, let me understand; you&#x27;re ostensibly smart enough to (perhaps as a body of contributors, even) develop a cryptocurrency offering - yet youre also fucking stupid enough to not have same&#x2F;wider network of ppl attempt to hack the fuck out of your plan?<p>Does this already occur? or some savant comes and owns them?<p>We have fucking HIPPA FFS and the compliance systems for something as trivial as my stupid name.<p>so; ELI5: WTF are currencies doing&#x2F;not-doing which allow for such hacks (1) and allow for exploits to go unseen (2)
评论 #14807966 未加载
评论 #14808003 未加载
评论 #14807984 未加载
rjurneyalmost 8 years ago
I can&#x27;t even understand what you are all talking about. Crazy kids. I&#x27;m not even kidding. Usually I can figure out what the topic of conversation is if I&#x27;m not familiar with it, but in this case I&#x27;m like three degrees removed from comprehension.<p>Sounds like this is all probably dot com bullshit, but maybe something genius will come out of it that is unforeseen now.
curiousgalalmost 8 years ago
Maybe it was a feature not a bug.
likeclockworkalmost 8 years ago
If the code of the contract IS the contract, how was anything &#x27;stolen&#x27;?
rocky1138almost 8 years ago
How do we know this is stolen? The link doesn&#x27;t provide much detail.
评论 #14807985 未加载
6nfalmost 8 years ago
Time for another hard fork!
campbelltownalmost 8 years ago
It appears the hacker has begun moving ether from the account. The number presented in this link will no longer match the amount in the title. There is currently 83K ether remaining.
viachalmost 8 years ago
Looks like a good motivation to start learning Solidity.
codewizalmost 8 years ago
Can someone ELI5?<p>I use Parity, I have a wallet contract deployed, it&#x27;s night and I&#x27;m wearing sunglasses.
评论 #14807886 未加载
评论 #14807891 未加载
hohenheimalmost 8 years ago
I wonder, why the black hat didn&#x27;t drain all the money and left it for the white hat group?
评论 #14811070 未加载
kevinwangalmost 8 years ago
Can anyone explain? Don&#x27;t know what I&#x27;m looking at.
评论 #14807909 未加载
sparky_almost 8 years ago
Didn&#x27;t they fork the project a while ago due to theft?
joeblaualmost 8 years ago
It&#x27;s being put back: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14811534" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14811534</a><p><i>Edit: Without Vitalik or a hard fork.</i>
davidwalmost 8 years ago
I miss patio11&#x27;s posts on these things.
评论 #14809335 未加载
tbarbuglialmost 8 years ago
how much money is that?
评论 #14808200 未加载
评论 #14808160 未加载
thecrazyonealmost 8 years ago
the link seems to be down. Did we DDoS it ?
mtgxalmost 8 years ago
So will the devs create another Ethereum fork to recover this money?
评论 #14811147 未加载
draw_downalmost 8 years ago
It&#x27;s &quot;cynical&quot; to point out these problems will keep happening, but then they keep happening. So, not much to say.
评论 #14809120 未加载
imronalmost 8 years ago
Don&#x27;t worry, they can just do another hard fork and get the money back, amirite?
qwertyuiop85almost 8 years ago
0x2ee4899d44F086e8ee974399f404214de33F9b68 Please donate, I&#x27;ll go full time auditing code from now on. WHG member.
WhatsNamealmost 8 years ago
<a href="https:&#x2F;&#x2F;cryptowat.ch&#x2F;kraken&#x2F;ethusd" rel="nofollow">https:&#x2F;&#x2F;cryptowat.ch&#x2F;kraken&#x2F;ethusd</a>
评论 #14807941 未加载
qwertyuiop85almost 8 years ago
0x2ee4899d44F086e8ee974399f404214de33F9b68 Please donate, I&#x27;m going full bug hunting from today on your behalf. WHG dev. S.