• chicken@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 month ago

    the release included … handwritten notes that displayed the wallet seed phrases.

    Should actually be easy in this case to tell whether it was in fact the cops that took the money; just check whether the time of the transaction was before or after the time of the press release.

    • DragonTypeWyvern@midwest.social
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 month ago

      Nah because if you’re a tricky sort you just make the release because you know you’ve got plausible deniability when you drain the account after whatever amount of time you thought was reasonable.

        • DragonTypeWyvern@midwest.social
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 month ago

          How often do you zoom in on public releases to see if anyone posted their crypto keys?

          Sure, the chances aren’t zero, but they’re lower than doing it when you’re one of three people with access or whatever.

          • chicken@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            1 month ago

            I’m not looking to steal people’s crypto. North Korea on the other hand makes billions a year finding ways to steal cryptocurrency online. If your crypto keys get leaked online in any form, I would consider that money gone because of all the highly skilled and motivated people actively trying to take it. Not that it would take an incredible amount of skill to write a scraping bot that uses ocr+regex.