[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance


View post   

File: 80 KB, 877x475, img-3-3-53c817ddd5221cd34f9f87565bceb94ba8e7fbba62d15d7b276280d6c4cb5ac0.png [View same] [iqdb] [saucenao] [google]
3928752 No.3928752 [Reply] [Original]

How much LINK did he steal & what was the market value at the time he stole it?

>> No.3928871
File: 276 KB, 523x457, thinkinb about link.png [View same] [iqdb] [saucenao] [google]
3928871

binance stole the lot of it. greedy fucking jewhales with their illuminati bots AAAAAAAAAAAAAAAAAAAAAA fucking dogs.

NOBODY IS STOPPING THE MOONTRAINMETRO

>> No.3928910

>>3928871
>MOONTRAINMETRO


That's it, I'm out. Srsly, MOONTRAINMETRO? I don't care if some of my LINK will be sold at a loss, I'm out.

This meme is dead. to me.

>> No.3928936

>>3928752
>Stolen LINK

Wut?

>> No.3928942

>>3928871
How did Binance steal anything?

>>3928936
There was a malicious tumblr link a couple weeks ago that stole people's LINK held in ED.

>> No.3928962

im glad you out you fucking cuck enjoy being poor

>> No.3929344

>>3928910
Ty for your bags

>> No.3929363

He stole 20k from one user and i think 800 from another. I was in the thread

>> No.3929408
File: 350 KB, 1232x624, Untitled.png [View same] [iqdb] [saucenao] [google]
3929408

>>3929363
I was the guy who lost 800

>> No.3929425

>>3929408
Did u recover

>> No.3929440
File: 19 KB, 620x576, I-Know-That-Feel-Bro[1].jpg [View same] [iqdb] [saucenao] [google]
3929440

>>3929408

>> No.3929468
File: 241 KB, 981x315, rember.png [View same] [iqdb] [saucenao] [google]
3929468

>>3929440
>>3929425

Yeah, some good-guy anon sent me $200 in ETH which is what I had spent on the LINK at that time.

>> No.3929716

>>3929468
I love this story

>> No.3929734
File: 120 KB, 1366x768, BROTIERSUPREME.png [View same] [iqdb] [saucenao] [google]
3929734

>>3929716

This place has people who are cool as fuck.

I hope we make it & can pass on this legacy ourselves.

>> No.3929953

What happened???????

>> No.3929969
File: 112 KB, 564x552, 1504323351243.jpg [View same] [iqdb] [saucenao] [google]
3929969

>>3929734
>>3929468

daily reminder that all these feel good moments are engineered by P&D groups to get you emotionally attached to your LINK

>> No.3929976

>>3929408
How was it stolen?

Is there some kind of exploit?

>> No.3929992

>>3929976
yeah you click on a shitbox link and get your link stolen, its 2017 nigger

>> No.3930011

>>3929992
Anyone get a copy of what was on the webpage?

>> No.3930019

I have the code if anyone wants it

>> No.3930035

>>3930019
yo!
I'm interested.

>> No.3930043
File: 390 KB, 1280x720, 1508211223268.jpg [View same] [iqdb] [saucenao] [google]
3930043

>>3929969
I'm not emotionally attached, I recently cut smoking out of my life and have been spending my smoking budget on CRYPTO so it's all been a jolly experiment / gamble. I think blockchain is fascinating, all moon memes aside. If you don't appreciate the tech and innovation, why are you even here?
Chainlink is a gamble but I've definitely done my own research and I'm willing to gamble money on it.
Worst case scenario I lose money I was going to smoke up anyways.
That and I'm at a profit for my link presently.
Your post is pretty ominous desu

>> No.3930067
File: 83 KB, 641x771, 1504740364724.jpg [View same] [iqdb] [saucenao] [google]
3930067

>>3930035
Nigger

They fixed the vulnerability shortly after

>> No.3930082

>>3930067
I expected as much, I'm just interested in how it works.

>> No.3930100
File: 27 KB, 400x209, 1506547537147.png [View same] [iqdb] [saucenao] [google]
3930100

patched

>> No.3930125
File: 31 KB, 567x416, 1488937878676.jpg [View same] [iqdb] [saucenao] [google]
3930125

>>3930082

>> No.3930219

>>3930100
So, why does running that javascript in a browser steal your link?
Is it a plugin or something?

>> No.3930254

>>3930219
its called corss site scripting: XSS
the script tag runs the code in the browser as if it was embedded in the webpage

>> No.3930267

>>3930254
cross site scripting*

>> No.3930284

>>3930254
>>3930267
Gotcha.
I thought that was just in some page's source.

Didn't know that request indirection thing existed though, that seems like it'd be useful for exfiltration.

>> No.3930302

>>3930284
the request website is there it sends the private keys there to redirect. I'm sure that website just redirects to something he hosts. After he got the keys, he manually had to log in with them to steal. That gave me enough time to take all my LINK out, as i clicked on the link kek.

>> No.3930318

>>3930302
Any idea where the xss problem was in the site?

I can't see anywhere for users to input text.

>> No.3930335

>>3930318
no clue. i dont think there was any need for an input field, as the script ran directly from the URL. I think etherdelta was just prone to executing script tags.