IT professional with smart contract executable authorisation get tricked into downloading malware?
It's similar to the stories coming out of Boeing and other corporations due to DEI based hiring policies.
I'm not giving up on the project but I anticipate significant lack of trust from many which I think is understandable.
Bro said a whole load of nothing, care to be more concise than just pure fud mate ?
Did I not simply describe what occurred? Why would you expect no future problems after what this project has already experienced?
The project has experienced two mutually exclusive events and ignorant fudders like to pool these two scenarios under being ‘hacked twice’. Since the most recent event it has honestly shown how emotional crypto is for some ppl and tbh if you’re reacting with numerous questions (most of which have been answered in pinned comments) and accusations with no substance then honestly - crypto and especially Nxra are not for you. Stay calm and collected. Good things come to those who wait.
They are two significant attacks that were able to occur due to lacking security practices. Of course people are going to comment on this. A crypto project cannot be relaxed in this regard. There must be hypervigilance and review and testing by multiple parties. Trying to gaslight token holders as ignorant and emotional just shows how lacking in objectivity you are. It's clear that you're saying what you're saying purely out of concern for "fud" affecting the value of your tokens. Framing these hacks as lessons to learn from is insane. They should never have occurred in the first place.
I don’t consider it insane, a vulnerability has been exposed, and now barred from happening again
He's saying that he even anticipates future issues and it's a learning process. No. The team should have the experience and skillset already as well as employing third parties that do. It's not beta software in testing. It's live financially involved software.
It’s the easiest thing to do to say there never ever will be any vulnerabilities. The Safari browser just patched the 0.0.0.0 day vulnerability, present for 18 years
It's not an absolutist issue. All software contains bugs but financially involved software generally is developed with a very high level of intolerance for bugs and with more rigorous testing and security reviews than normal.
Good thing there were no bugs!!! Or exploits!!! To frame it that way is lying.
I didn't say it was. I was responding to Voslauer's point. What happened is arguably less forgivable than a complex bug exploit.
Your opinion and thanks for sharing. I think what happened was the equivalent of the world's best criminal group since Anonymous attacking our operations and us successfully defending, mitigating, and reversing it within hours.
Обсуждают сегодня