this post was submitted on 08 Aug 2024
18 points (100.0% liked)

Cybersecurity

5945 readers
104 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
top 3 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 5 months ago

Remember, code is law. It wasn't stolen, the code has decided that it belongs to the exploiter.

[–] [email protected] 5 points 5 months ago

It's funny how this keeps happening, and mostly keeps happening in the same way.

You'd think after the hundredth time it happens people would start fixing it so you can't simply exploit smart contracts via proxy, but I'm a simple computer janitor so what do I know.

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago)

The fact this is rare and mostly isolated to shitcoins demonstrates the security of more established cryptos (for now).