• chicken@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      9 days ago

      the release included … handwritten notes that displayed the wallet seed phrases.

      Should actually be easy in this case to tell whether it was in fact the cops that took the money; just check whether the time of the transaction was before or after the time of the press release.

      • DragonTypeWyvern@midwest.social
        link
        fedilink
        English
        arrow-up
        3
        ·
        9 days ago

        Nah because if you’re a tricky sort you just make the release because you know you’ve got plausible deniability when you drain the account after whatever amount of time you thought was reasonable.

          • DragonTypeWyvern@midwest.social
            link
            fedilink
            English
            arrow-up
            1
            ·
            9 days ago

            How often do you zoom in on public releases to see if anyone posted their crypto keys?

            Sure, the chances aren’t zero, but they’re lower than doing it when you’re one of three people with access or whatever.

            • chicken@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              9 days ago

              I’m not looking to steal people’s crypto. North Korea on the other hand makes billions a year finding ways to steal cryptocurrency online. If your crypto keys get leaked online in any form, I would consider that money gone because of all the highly skilled and motivated people actively trying to take it. Not that it would take an incredible amount of skill to write a scraping bot that uses ocr+regex.