Remember, code is law. It wasn't stolen, the code has decided that it belongs to the exploiter.
Cybersecurity
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
It's funny how this keeps happening, and mostly keeps happening in the same way.
You'd think after the hundredth time it happens people would start fixing it so you can't simply exploit smart contracts via proxy, but I'm a simple computer janitor so what do I know.
The fact this is rare and mostly isolated to shitcoins demonstrates the security of more established cryptos (for now).