this post was submitted on 25 Jul 2024
19 points (85.2% liked)
Monero
1662 readers
6 users here now
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
What you're saying is it's a legitimate attack at the time of executing pre-new build that fixes the bug? Not a fake and they could've really made money exploiting it in badly coded illegal markets? Thanks for clarify
They made money through extortion, not by draining any wallets due to spam. There was spam and it did delay transactions for regular users due to existing wallet bugs that are now fixed. I can't really comment on badly coded markets, I assume they somehow broke their payment systems because they didn't account for long delays when receiving coins or also had the fee selection bug.
I'm seriously getting confused here sorry how didn't they make money with the attack but through extortion? Did they break payment systems with monero slowdown or they slowed down monero and extorted money or they extorted money not to attack the monero network? I cant find what you're referencing to
If they were able to use it as attack doesn't that make it actionable and jet who commented wrong?
I was wrong, I didn't consider that their attack could drain badly coded DNM wallets by double-spending withdraw transactions.