Značka: Private Keys

Amber Group uses simple hardware to show just how fast, easy the Wintermute hack was

Amber Group has reproduced the recent Wintermute hack, the Hong Kong-based crypto finance service provider announced on its blog. The process was fast and simple, and used hardware easily accessible to consumers. Wintermute lost over $160 million in a private key hack on Sept. 20.Reproducing the hack can help “build a better understanding of the attack surface spectrum across Web3,” Amber Group said. It was only hours after the hack of UK-based crypto market maker Wintermute was revealed that researchers were able to pin the blame for it on the Profanity vanity address generator. One analyst suggested that the hack had been an inside job, but that conclusion was rejected by Wintermuteand others. The Profanity vulnerability was already known before the Wintermute hack.classy— wishful cynic (@EvgenyGaevoy) September 27, 2022Amber Group was able to reproduce the hack in less than 48 hours after preliminary setup that took less than 11 hours. Amber Group used a Macbook M1 with 16GB RAM in its research. That was far speedier, and used more modest equipment, than how a previous analyst had estimated the hack would play out, Amber Group noted. Related: The impact of the Wintermute hack could have been worse than 3AC, Voyager and Celsius — Here is whyAmber Group detailed the process it used in the re-hack, from obtaining the public key to reconstructing the private one, and it described the vulnerability in the way Profanity generates random numbers for the keys it produces. The group notes that its description “does not purport to be complete.” It added, repeating a message that has often been spread before:“As well documented by this point — your funds are not safe if your address was generated by Profanity […] Always manage your private keys with caution. Don’t trust, verify.”The Amber Group blog has been technically oriented from its inception, and has addressed security issues before. The group achieved a $3-billion valuation in February after a Series B+ funding round.

Čítaj viac

Crypto winter teaches tough lessons about custody and taking control

The crypto winter has pumped new life into the adage “Not your keys, not your coins,” particularly after the collapse of some high-profile enterprises like the Celsius Network, whose funds were frozen in June. Just last week, Ledger CEO Pascal Gauthier hammered home the point further, warning: “Don’t trust your coins and your private keys to anyone because you don’t know what they’re going to do with it.”The basic idea behind the adage, familiar to many crypto veterans, is that if you don’t personally hold your private keys (i.e., passwords) in an offline “cold wallet,” then you don’t really control your digital assets. But, Gauthier was also framing the issue in a larger context as the world moves from Web2 to Web3:“A lot of people are still in Web2 […] because they want to stay in the matrix where they’re being controlled, because it’s easier, it’s you know just click yes yes yes and then someone else is going to deal with your problems.” But, giving away control won’t set you free. “Taking responsibility is how you become free.” Admittedly, Gauthier has a self-interest here — Ledger is one of the world’s largest cold-wallet providers. Then, too, he may have been stating the obvious. In May, Coinbase acknowledged in an SEC 10-Q filing that if it ever went bankrupt, customers that entrusted their digital assets to the exchange “could be treated as our general unsecured creditors,” i.e., could find themselves standing at the back of the creditors’ line in bankruptcy proceedings. “It doesn’t matter that the exchange’s contract with you says you ‘own’ the currency,” Georgetown University law professor Adam Levitin told Barron’s at the time, “That’s not determinative of what will happen in bankruptcy.” But, Gauthier’s statement raises other questions, too. This notion of seizing “control” of one’s keys and coins could become more complicated given recent regulatory proposals in Europe, as well as a key government agency interpretation in the United States. Moreover, as the world transitions from Web2 to Web3, is it really so certain that centralized solutions like Coinbase and others might still not have an important role to play with regard to custody and, yes, even privacy?Learning the hard wayGenerally speaking, it appears that consumers still do not understand the potential risks when they turn their crypto private keys over to centralized platforms and exchanges.“It’s been made abundantly clear that even the most seemingly trustworthy custodians can still make grave missteps with user funds,” Nick Saponaro, CEO at the Divi Project, told Cointelegraph. “The promise of self-sovereign ownership of your money is immediately obliterated when users hand over their private keys to any third-party, regardless of that third-party’s genuine intent.”“All crypto users should learn and be responsible for the security of their own coins by storing them securely on hardware wallets,” Bobby Ong, co-founder and chief operating officer at CoinGecko, told Cointelegraph.“However, this is not a popular move because for most crypto users, it is probably more convenient to store them on centralized exchanges.”Recent: Blockchain firms fund university research hubs to advance growthStill, a centralized exchange (CEX) can be useful at times and maybe we should expect to live in a hybrid cryptoverse for a while, with both cold and hot wallets, centralized and decentralized exchanges (DEXs).“There is a case for using centralized exchanges for sending funds to others to not doxx your crypto addresses,” said Ong. “This is because when you send a transaction to someone else, they will know your address and can see your balance, historical transactions, and all future transactions.” Indeed, Ong tweeted recently: “The basic advice now is to have multiple wallets for various purposes and to fund these wallets using centralized exchanges. This works well but it’s not good enough. If you use FTX or Binance, Uncle Sam and Changpeng Zao will know all your wallets and they can profile you instead.”Continued Ong, “To get full privacy for your new wallet, a service like Tornado Cash is needed. Granted, it’s probably more expensive, slow and tedious,” but having such an option would ensure privacy and make crypto behave more like cash, he added.Justin d’Anethan, institutional sales director at Amber Group, agreed that trade-offs remain. “You can’t do as many sophisticated trades from a private wallet as you can on a centralized platform, or at least not as easily and efficiently,” he told Cointelegraph. Large, sophisticated traders will always need to have some of their holdings on exchanges to optimize returns. In his personal case:“I hold a chunk of my core holdings in private wallets, but I definitely hold some assets on centralized platforms for yield generation, some rebalancing, etc.”Corporate entities, especially, may not want to handle the operational side of a trade, including investment and custody, and they may also want to interact with a recognized and established centralized entity that can perform due diligence. Also, corporations may want to have an identifiable and liquid entity to sue “in the event of an error,” added d’Anethan.On the retail side, setting up a private wallet can still be daunting, which may explain why so many entrust private keys to CEXs and the like, even if it isn’t always the best way. As d’Anethan told Cointelegraph:“You might not know how — or have the motivation — to buy a private wallet, set it up to hold your private key and bear the risk of losing it. So, the path of least resistance wins.” Do regulators still not “get it?”Elsewhere, self-hosted wallet providers may soon face tough regulations in Europe if and when the EU’s Transfer of Funds Regulation (TFR) proposal takes hold. It could overturn this whole notion about taking control of one’s private keys and coins. “Effectively, it would amount to a ‘de facto’ ban on self-hosted wallets by enforcing to connect personal identities with self-hosted wallets,” wrote Philipp Sandner and Agata Ferreira.Mikolaj Barczentewicz, associate professor at the United Kingdom’s University of Surrey, told Cointelegraph: “The TFR proposal doesn’t ban self-custodied wallets, but it does incentivize service providers to treat them as ‘high risk’ for money laundering.[…] It may become practically very difficult to transact using self-hosted wallets.”Defenders of the TFR might respond that it’s not regulators’ fault that businesses are not better at risk-based analysis and at distinguishing situations of genuinely high risk of criminality, but “I don’t think that answer works,” continued Barczentewicz. “It shows a lack of understanding — or care — for the fact that regulations need to be designed to be workable in the real world. The EU is basically saying to businesses: ‘You figure it out.’”However, the biggest threat to self-custodied wallets in Barczentewicz’s view “is something like the scenario we’ve been watching in reaction to Tornado Cash being sanctioned by the U.S.: Businesses are afraid and engaging in over-compliance, doing more than the law requires.”As reported, on Aug. 8, the United States Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued legal sanctions against digital currency mixer Tornado Cash for its role in laundering over $455 million worth of cryptocurrency stolen by the North Korean-linked hacking organization Lazarus Group.According to data analytics firm Chainalysis, the obligations of non-custodial crypto wallet providers are now unclear under OFAC’s recent designation: “An extreme interpretation could mean that non-custodial wallet providers might also need to block transfers to the sanctioned addresses, though this would be unprecedented.” At a minimum, government actions like these suggest that cold-wallet solutions to help crypto users take control of their private keys could become more problematic — not less — at least in the immediate future.An education imperative?Overall, does the crypto industry face an education challenge here i.e., to explain the importance of cold storage and individual “responsibility” to both individuals and policymakers? “I think we have to be honest with ourselves,” answered Saponaro. “Yes, education can help some individuals avoid the pitfalls we’ve witnessed in recent months, but most people will not read every article, watch every video or take the time to educate themselves.” Developers have a responsibility to develop products that guide users “into learning by doing.” “The crypto community, including in the EU, can still do much more to educate policymakers,” added Barczentewicz. “But this education cannot be limited to just explaining how crypto works. It is a mistake to think that once policymakers ‘get it,’ they will come up with sensible rules on their own.” The crypto community needs to be proactive in proposing detailed technical and regulatory notions of how to fight crime and malfeasance without giving up key benefits of crypto, like self-custody, he said. “It is not enough just to mention buzzwords like ‘zero knowledge proofs’ and then expect the policymakers to do the hard work.”Is taking “control” really important?What about Gauthier’s larger point that people simply have to learn to take “responsibility” for their assets — digital and otherwise — because “taking responsibility is how you become free?”“Crypto is a game-changer because we now have full control of our money without the need to trust any third-party,” said Ong. That said, some people “may choose to pass on the responsibility and trust a third-party custodian who may be better equipped to store their coins safely — and that is acceptable too,” he told Cointelegraph. Recent: Crypto volatility may soon recede despite high correlation with TradFi“In the crypto space, you typically have very binary opinions about how things can grow from here. I think the truth is somewhat in the middle,” said d’Anethan, adding:“One is delusional if one thinks every individual and corporate is going full DeFi tomorrow. But, one would also be delusional if one thinks the growing digital world will forever stay within the Web2 infrastructure.”What may be best is to have both centralized and decentralized platforms, “so that the user base can gradually shift where it sees the most value — however long that takes,” he said.

Čítaj viac

What is a seed phrase and why is it important?

A seed phrase might be confusing and probably you might be wondering how a seed phrase looks and maybe how it is created. The seed phrase is generated by a cryptocurrency wallet and the user has no way of customizing it. The words generated are derived from a list of 2048 words. So, how many words is a seed phrase? A seed phrase is made up of a long string consisting of a group of random words. The words on a seed phrase are simplified so that the user can remember them, unlike if the seed phrase consisted of long numbers or special characters.  The recovery phrase consists of 12 to 24 words like energy, road or open. To avoid errors, these randomly generated words do not include pairs like “man” and “men” in the same seed phrase. Bitcoin improvement proposal-(BIP)-39 in 2013 introduced these types of phrases and established a standard for deterministic wallets. Here is an imaginary 12-word seed phrase: Cry, planet, Loose, Typical, Humankind, Toddler, Anxiety, Difficult, Happy, Never, Alternative, Remorse. A seed phrase controls all the private keys associated with a deterministic wallet. BIP-39 proposal makes major wallets cross-compatible, allowing the users to load the recovery phrase to a new BIP-39-compatible wallet to access the funds when they are lost or if you want to switch wallets.

Čítaj viac

Millions of dollars in ETH lie unclaimed in presale wallets — but there's a way to get them back

Out in the cryptosphere, there’s a vast amount of wealth that’s seemingly out of reach.A long-running statistic suggests four million Bitcoin — almost 20% of the total supply — has been lost forever. Much of it was mined when the network was just beginning, with early adopters tearing their hair out after losing their private keys. One Welshman has endured a nine-year battle as he attempts to receive a hard drive containing 7,500 BTC from landfill. But this isn’t the only treasure trove that’s worth exploring. For example, did you know that over 500 Ethereum presale wallets are yet to be recovered… and collectively, they have a value of several billion dollars?The presale for ETH — which is now the world’s second-largest cryptocurrency — took place back in the summer of 2014. At the time, 1 Bitcoin would buy you 2,000 Ether. Fast forward to now, and the exchange rate is much less generous: 1 BTC will only fetch 12 ETH. A whopping 8,893 people participated in this presale and were given tokens in the genesis block — but according to experts, hundreds of wallets remain untouched.Some of these wallets contain tens of ETH — a figure that’s worth tens of thousands of dollars today. Others have more than 10,000 ETH inside, meaning their owners are missing out on a life-changing $20 million.All of this conjures up big questions: Are these wallets a lost cause? Will the upcoming merge — where Ethereum moves from a Proof-of-Work to a Proof-of-Stake blockchain — mean these funds are just irretrievable? And what’s more, who in their right mind would lose access to their crypto after taking part in a presale?Well, there are a plethora of factors that can lead to the private keys of presale wallets being lost. It could have been a problem with a browser, challenges with foreign language keyboard settings, or poor security practices. Let’s not forget that crypto was shiny and new back then — and many early investors were figuring things out as they went along.So… what should the people who own one of these presale wallets do? Give up, and dream of what could have been? Use this experience as a gripping story at dinner parties — regaling people of how you missed out on millions of dollars? Or fight back, and begin the painstaking process of reclaiming what’s rightfully yours? How to recover a presale walletIt can be done. The first step is to head to Etherscan, a blockchain explorer, and check the balance of the address that you’re struggling to retrieve. If there’s crypto yet to be claimed, there’s work to be done — and it’s time to take a step back and reflect on what the password requirements would have been for your wallet.This next bit is a little more challenging. You need to try and remember the passwords that you commonly used at the time. Software called Hashcat can be used to test a plethora of variations — alternating between uppercase and lowercase characters, and changing letters like a and i for special characters like @ and !. With the right GPU card, you’ll have the opportunity to perform 200,000 password checks per second.All of this may seem like a long shot — and there’s still a risk that you’ll end up empty handed, unable to find the elusive password to your Ether presale wallet. But this doesn’t mean that you’re out of options. Next, it’s time to get the help of professionals who have a track record of cracking the code and reuniting owners with their crypto. KeychainX says forgotten presale wallets often have specific parameters — and it has created custom-made software to successfully recover lost crypto.The project told Cointelegraph: “Lost crypto wallets are a big headache for many crypto owners. KeychainX has helped over 200 people in the last 12 months to recover millions of lost Ether, Bitcoin and Dogecoin.”The proof is in the puddingOne Ethereum enthusiast contacted KeychainX after being part of the Ether presale — amassing 1,000 ETH for just $300. At the time of writing, this crypto sum would be worth a cool $2 million. There was just one problem: the customer believed the wallet was corrupt.He was pretty sure of the password, but there were two main problems: firstly, he was half French, meaning there might be a problem with the decryption of foreign characters. Second, the password was 99 characters long. (And to top it all off, the password was of a sexual nature, meaning the project’s specialists needed to find common phrases in both English and French that could be tested.)KeychainX managed to figure out how to translate the special characters that had encrypted his wallet — treating them as they were Cyrillic. It was a process that took several weeks — and on top of all that, it took three days to track down the customer and give them the good news. The project isn’t just working to retrieve long lost crypto, but prevent the investors of tomorrow from ending up in a similar situation. It’s received a patent in the U.S. and Japan for a keyless crypto wallet that uses geolocation data and biometrics to store private keys. And what’s more, it’s planning to launch an automatic crypto recovery site that will enable people to use their surplus GPU power to join a social recovery system. Ethereum co-founder Vitalik Buterin recently shared his vision for social recovery at the Blockchain Futurist Conference in Canada — explaining how the world of Web3 could offer a more effective approach for retrieving accounts than Web2 ever could. As an example, users could nominate five recovery contacts — two of them institutions and one of them an employer, as well as their father and a friend. Three of these trusted sources could then come together to confirm that an account should be unlocked.Losing crypto can be devastating — but projects like KeychainX are working to ensure far, far fewer people experience this in the future.Disclaimer. Cointelegraph does not endorse any content or product on this page. While we aim at providing you with all important information that we could obtain, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor can this article be considered as investment advice.

Čítaj viac

Organizations look toward multiparty computation to advance Web3

Protecting user data and private keys is crucial as Web3 advances. Yet, the number of hacks that have occurred within the Web3 space in 2022 alone has been monumental, proving that additional security measures, along with greater forms of decentralization, are still required. As this becomes obvious, a number of organizations have started leveraging multiparty computation, or MPC, to ensure privacy and confidentiality for Web3 platforms. MPC is a cryptographic protocol that utilizes an algorithm across multiple parties. Andrew Masanto, co-founder of Nillion – a Web3 startup specializing in decentralized computation – told Cointelegraph that MPC is unique because no individual party can see the other parties’ data, yet the parties are able to jointly compute an output: “It basically allows multiple parties to run computations without sharing any data.”Masanto added that MPC has a history that runs parallel to blockchain. “Around the same time that blockchain was conceptualized, a sibling technology purpose-built for processing and computation within a trustless environment was being developed, which is multiparty computation,” he said. It has also been noted that the theory behind MPC was conceived in the early 1980s. Yet, given the complexity of this cryptographic method, practical uses of MPC were delayed. Understanding how MPC will transform Web3It was only recently that blockchain-based platforms began to implement MPC to ensure data confidentiality without revealing sensitive information. Vinson Lee Leow, chief ecosystem officer at Partisia Blockchain – a Web3 infrastructure platform focused on security – told Cointelegraph that MPC is a perfect ideological match for the blockchain economy. Unlike public blockchain networks, he noted that MPC solves for confidentiality through a network of nodes that computes directly on encrypted data with zero knowledge about the information. Given this, companies focused on digital asset security began leveraging MPC in 2020 to ensure the security of users’ private keys. Yet, as Web3 develops, more companies are starting to implement MPC to create a greater level of decentralized privacy for various use cases. Masanto added:“The evolution of Web2 to Web3 focuses on creating methods where people and organizations can collaboratively work on different data sets in a manner that respects privacy and confidentiality while maintaining compliance. Blockchains are not purpose-designed for this because they are typically inherently public, and smart contracts are often run by one node and then confirmed by others. MPC breaks down the computation across the network of nodes, making it a truly decentralized form of computation.”The promise of MPC has since piqued the interest of Coinbase, which recently announced its Web3 application functionality. Coinbase’s new wallet and DApp functionalities are operated with MPC in order to secure the privacy of senders and receivers while ensuring the accuracy of a transaction. Rishi Dean, director of product management at Coinbase, explained in a blog post that MPC allows users to have a dedicated, secure on-chain wallet. “This is due to the way this wallet is set up, which allows the ‘key’ to be split between you and Coinbase,” he wrote. Dean added that this provides a greater level of security for users, noting that if access to their device was lost, a DApp wallet is still safe since Coinbase can assist in the recovery. While Coinbase released this feature in early May 2022, the crypto wallet provider ZenGo was equipped with MPC from the company’s inception in 2018. Talking with Cointelegraph, Tal Be’ery, co-founder and chief technology officer of ZenGo said that the wallet applies MPC for disrupted key generation and signing, also known as threshold signature scheme (TSS). He explained that the key is broken up into  two “secret shares” split between the user and the company server.Related: Blockchain and NFTs are changing the publishing industryAccording to Be’ery, this specific type of MPC architecture allows a user to sign an on-chain transaction in a completely distributed manner. More importantly, Be’ery added that both secret shares are never joined. “They are created in different places, and used in different places, but are never in the same place,” he explained. As such, he noted that this model remains true to the original MPC promise: “It jointly computes a function (the function in this case is key generation or signing) over their inputs (key shares), while keeping those inputs private (the user’s key share is not revealed to the server and vice versa).”Be’ery believes that using MPC for signatures is complementary to blockchain technology, since a private key is also required to interact with blockchain networks. However, the TSS method leveraged by ZenGo allows users to distribute their private key, adding an additional layer of security. To put this in perspective, Be’ery explained that private keys for non-custodial wallet solutions are typically burdened by an inherent tension between confidentiality and recoverability:“Because a private key is the only way to access the blockchain in traditional wallets, it also represents a singular point of failure. From a security perspective, the goal is to keep this private key in as few places as possible to prevent it from getting in others’ hands. But from a recoverability perspective, the goal is to keep the private key as accessible as needed, in case there is a need to recover access.”However, this tradeoff is not an issue for most MPC-powered systems, as Be’ery noted that this is one of the main challenges MPC solves for crypto wallet providers. Moreover, as Web3 develops, other multiparty computation use cases are coming to fruition. For example, Oasis Labs – a privacy-focused cloud computing platform built on the Oasis network – recently announced a partnership with Meta to use secure multiparty computation to safeguard user information when Instagram surveys asking for personal information are initiated. Vishwanath Raman, head of enterprise solutions at Oasis Labs, told Cointelegraph that MPC creates unlimited possibilities for privately sharing data between parties: “Both parties gain mutually beneficial insights from that data, providing a solution to the growing debate around privacy and information collection.”Specifically speaking, Raman explained that Oasis Labs designed an MPC protocol together with Meta and academic partners to ensure that sensitive data is split into secret shares. He noted that these are then distributed to university participants that compute fairness measurements, ensuring that secret shares are not used to “learn” sensitive demographic data from individuals. Raman added that homomorphic encryption is used to allow Meta to share their prediction data, while ensuring that no other participants can uncover these predictions to associate them with individuals:“We can say with confidence that our design and implementation of the secure multiparty computation protocol for fairness measurement is 100% privacy-preserving for all parties.”MPC will reign supreme as Web3 advancesUnsurprisingly, industry participants predict that MPC will be leveraged more as Web3 advances. Raman believes that this will be the case, yet he pointed out that it will be critical for companies to identify logical combinations of technologies to to solve real-world problems that guarantee data privacy: “These protocols and the underlying cryptographic building blocks require expertise that is not widely available. This makes it difficult to have large development teams designing and implementing secure multiparty computation-based solutions.”It’s also important to highlight that MPC solutions are not entirely foolproof. “Everything is hackable,” admitted Be’ery. However, he emphasized that distributing a private key into multiple shares removes the singular attack vector that has been a clear vulnerability for traditional private key wallet providers. “Instead of getting access to a seed phrase or private key, in an MPC-based system, the hacker would need to hack multiple parties, each of which has different types of security mechanisms applied.”While this may be, Lior Lamesh, CEO and co-founder of GK8 – a digital asset custody solution provider for institutions – told Cointelegraph that MPC is not sufficient by itself to protect institutions against professional hackers. According to Lamesh, hackers simply need to compromise three internet-connected computers to outsmart MPC systems. “This is like hacking three standard hot wallets. Hackers will invest millions when it comes to stealing billions,” he said. Lamesh believes that an MPC enterprise-grade approach requires a true offline cold wallet to manage most digital assets, while an MPC solution can manage small amounts. Related: Ethereum Merge: How will the PoS transition impact the ETH ecosystem?Masanto further claimed that traditional MPC solutions may be superior to a solution that “stores sensitive data across many different nodes in the network as a group of unrecognizable, information-theoretic security particles.” As the result, hackers would need to find each particle without any identifiable footprint connecting any of the nodes. Masanto added that to make the particle recognizable again, the hacker would need a large proportion of “blinding factors,” which are used to hide the data inside each particle in an information-theoretic security manner.Those are just some example of how MPC-based solutions will advance in the future. According to Masanto, this will create access to even more MPC use cases and, for example, utilizing the network itself for authentication: “We consider this a form of ‘super authentication’ – a user will authenticate based on multiple factors (e.g., biometrics, identity, password, etc.) to a network without any of the nodes in the network knowing what they are actually authenticating because the computation of authentication is part of MPC.”According to Masanto, such a form of authentication will lead to use cases within identity management, healthcare, financial services, government services, defense and law enforcement. “MPC enables systems to be made interoperable while also respecting peoples’ rights and giving them control and visibility over their data and how it is used. This is the future.”

Čítaj viac

Velodrome recovers $350K stolen funds from team member Gabagool

Velodrome Finance, a trading and liquidity marketplace, announced the recovery of $350,000 stolen on Aug. 4. However, the occasion turned bittersweet when internal investigations pointed out the involvement of a prominent team member, who goes by the pseudo name Gabagool.On Aug. 4, one of Velodrome’s high-worth wallets — dedicated for operating funds such as salaries — was drained off $350,000 before it could be transferred to the company’s treasury multisig wallet. A subsequent internal investigation revealed the attacker’s identification, which allowed the company to recover the entire loot. Velodrome’s official statement revealed:“Much to our disappointment, we learned the attacker was a fellow team member Gabagool.”While many community members came in support of the prominent coder, Gabagool owned up to the allegations made against him following Velodrome’s investigation. An update from Velodrome on our investigation into the team wallet exploit. pic.twitter.com/sz1ePStcT0— Velodrome (,) (@VelodromeFi) August 13, 2022Nearly six hours into the revelation, Gabagool released a note revealing various events that led him to attempt theft. Velodrome’s biggest mistake was to give ownership of its wallet’s private key to five individuals, which included Gabagool.Gabagool, just like many other investors, lost vast amounts of money during the 2022 crypto crash. In an attempt to recoup losses, Gabagool made the hasty decision of withdrawing $350,000 in various cryptocurrencies only to convert it to Ether (ETH) and send it to Tornado Cash.Gabagool note owning up to Velodrome theft. Source: TwitterBy the time Gabagool decided to return the stolen funds, Velodrome investigators “revealed they had already discovered my involvement.” He ended the note by stating:“Not much else to say. I’m extremely stupid, incredibly disappointed in myself and (frankly) unsure about what next, legally speaking.”On the other hand, Velodrome disclosed working with the legal counsel to determine the next steps. Going forward, Velodrome has decided to revoke ownership of private keys from team members and instead set up gnosis safes for all monetary operations.Related: BlueBenx fires employees, halts funds withdrawal citing $32M hackBlueBenx, a Brazilian crypto lending platform, too, encountered a hack, but what followed was incomparable to Velodrome Finance. BlueBenx reportedly blocked all of its 22,000 users from withdrawing their funds following an alleged hack that drained $32 million.While no details about the hack were revealed, numerous investors raised eyebrows on the matter, with one stating:“I think there’s a high probability of it being a scam because this whole hacker attack story seems like a lot of bullshit, something they invented.”The lack of trust among investors stems from the fact that numerous crypto platforms have recently halted funds withdrawal while hiding their incompetency in fulfilling the previously promised yield returns to the users.

Čítaj viac

Self-custody isn’t for everyone: WisdomTree exec on ‘be your own bank’

While some experts believe that self-custody is one of the genuine purposes of crypto, this way of storing coins is not really suitable for everyone, according to a WisdomTree executive.Will Peck, head of digital assets at New York-based asset manager WisdomTree, believes that self-custody will be a growing trend in the future, but custodial solutions should not be underrated.Some crypto users prefer to self-custody, and WisdomTree supports and respects that decision, the exec said in an interview with Cointelegraph. “That will be a growing segment of the market, and over time we want to build products and services for them,” he stated.As self-custody requires some technical skills and the responsibility to not lose one’s private keys, many may find self-custody way too uncomfortable or too hard to handle, Peck noted.“Of the billions of people and numerous institutional investors on the planet, a large number will lack the technical wherewithal, workflows or interest in holding their own private keys, which introduces a different set of complexities and risks,” the WisdomTree’s executive said. According to Peck, well-structured custody solutions, including products like crypto exchange-traded products (ETP) or regulated custody tools, can make crypto more accessible to a broader range of people. However, it requires vigilance and understanding of what users actually sign up for to avoid any risky activities with customers’ assets.“If you’re concerned about “not your keys — not your coins,” you should just understand who this firm is, what the reputation is, how they are embracing regulation, or they are not embracing regulation,” Peck said. He added that self-custody has been trending in the community over the past few months as firms like the crypto lender Celcius were pausing withdrawals due to liquidity issues amid the massive crypto winter of 2022. “They were doing incredibly risky things with those deposits,” Peck noted.Related: Self-custody is key during extreme market conditions: Here’s what experts sayThe latest remarks by WisdomTree’s head of digital assets come amid the company debuting its proprietary custodial wallet solution, WisdomTree Prime. The platform aims to provide exposure to major cryptocurrencies like Bitcoin (BTC) and Ether (ETH), as well as tokenized versions of physical assets like the U.S. dollar and gold.One of the largest crypto ETP providers, WisdomTree has launched eight crypto asset ETPs on Börse Xetra, SIX, the Swiss Stock Exchange and Euronext exchanges in Amsterdam and Paris. With the launch of WisdomTree Prime, the firm expects to expand its operations beyond ETP issuance. The wallet is currently live in beta and expected to be rolled out later in 2022.

Čítaj viac
Načítava

Získaj BONUS 8 € v Bitcoinoch

nakup bitcoin z karty

Registrácia Binance

Burza Binance

Aktuálne kurzy