39
top 6 comments
sorted by: hot top controversial new old
[-] DragonTypeWyvern@midwest.social 6 points 1 month ago

Sure they did, same way that 20% of any cash and drugs they find gets lost at every step in the chain of custody.

[-] chicken@lemmy.dbzer0.com 5 points 1 month ago

the release included ... handwritten notes that displayed the wallet seed phrases.

Should actually be easy in this case to tell whether it was in fact the cops that took the money; just check whether the time of the transaction was before or after the time of the press release.

[-] DragonTypeWyvern@midwest.social 3 points 1 month ago

Nah because if you're a tricky sort you just make the release because you know you've got plausible deniability when you drain the account after whatever amount of time you thought was reasonable.

[-] chicken@lemmy.dbzer0.com 1 points 1 month ago

I think if they try that it's more likely that someone else will get to it first.

[-] DragonTypeWyvern@midwest.social 1 points 1 month ago* (last edited 1 month ago)

How often do you zoom in on public releases to see if anyone posted their crypto keys?

Sure, the chances aren't zero, but they're lower than doing it when you're one of three people with access or whatever.

[-] chicken@lemmy.dbzer0.com 1 points 1 month ago* (last edited 1 month ago)

I'm not looking to steal people's crypto. North Korea on the other hand makes billions a year finding ways to steal cryptocurrency online. If your crypto keys get leaked online in any form, I would consider that money gone because of all the highly skilled and motivated people actively trying to take it. Not that it would take an incredible amount of skill to write a scraping bot that uses ocr+regex.

this post was submitted on 01 Mar 2026
39 points (97.6% liked)

Hacker News

4626 readers
521 users here now

Posts from the RSS Feed of HackerNews.

The feed sometimes contains ads and posts that have been removed by the mod team at HN.

Source of the RSS Bot

founded 2 years ago
MODERATORS