I'm just a little suspicious of this story.

Compromising two parties endpoints sounds much more likely than hacking a public and long-lived protocol.

Or its an inside job by someone without access to the hot wallet.

Reply to this note

Please Login to reply.

Discussion

I find it very odd that they mention one of the two key holders gets arrested and that there's no way that this person's key was compromised.