Avatar
Pepe NOSTRos
4b74667f89358cd582ad82b16a2d24d5bfcb89ac4b1347ee80e5674a13ba78b2
Time is near. Little by little then all at once. We ask for nothing, we do not recruit We simply share the lore when we return We are Raid Traders because we know the time is near So until the end, we raid.

This is what i dug up about poisoned transactions:

Transaction poisoning refers to an attack on the Ethereum network where a malicious actor manipulates data within a transaction to cause unintended consequences. This can include altering the recipient address or changing the value of the transaction, effectively stealing funds or causing other disruptions.

Let's consider a vulnerable smart contract that uses an unsafe method for transferring funds:

pragma solidity ^0.6.0;

contract VulnerableContract {

function sendEth(address payable recipient) public {

// Unsafe method: directly sending Ether without validating the recipient's balance or safeTransfer logic

recipient.transfer(msg.value);

}

}

In this example, the 'sendEth' function of the 'VulnerableContract' is susceptible to a transaction poisoning attack. If an attacker were to modify the recipient address and send a poisoned transaction with a large amount, the contract would unknowingly transfer funds to the wrong address, leaving users like you at risk of losing their funds.

Here's an example of how an attacker could exploit the vulnerable 'sendEth' function in our previous example:

pragma solidity ^0.6.0; // Exploit Code

contract ExploitContract {

address public hacker; // Store the hacker's address as a public variable

constructor() public {

hacker = 0xabcdef123; // Set the hacker's address to the contract when it's deployed

}

function sendEth(address payable recipient) public {

// Unsafe method: directly sending Ether without validating the recipient's balance or safeTransfer logic

recipient.transfer(msg.value);

// Poisoned transaction with modified recipient and amount

ExploitContract(hacker).sendEth(0xfakeaddress456);

}

}

In this example, an attacker could deploy their own contract (ExploitContract) and pass it as a parameter when deploying the vulnerable 'VulnerableContract'. By doing so, the hacker can manipulate the 'sendEth' function within the 'VulnerableContract', effectively stealing funds from legitimate users.

am not a solidity guy but this is what I found on quick dig

No vinney. I am dead serious . the market is not what you think it is. Its an entropy pump just like every competitive environment is. Its just too much to explain with thumbs. Plus now you decided to be rude so you can suss it yourself or not whatevs.

GM

Back at office

Let's do this

Because I don't need the market to give me pleasure and inefficiencies are what I trade to extract value. Just because I am profiting doesn't mean its fair or right or that I am not being skimmed.

Almost done anyway. If we don't blow ourselves up it will be irellevant. Universe is huge. Nothing is scarce.

I got this note from a jewish friend yesterday. He and family have been helping organize anti zionist rallies.

What say you Nostr?

My nephew from the IDF flew from Jerusalem to Columbus, Ohio on Friday to introduce his fiancée to his family and friends. Ohio state university is between the airport and his home and the streets were blocked by American white kids, his age of 22, waiving green Hamas flags and shouting from the river to the sea.

His base is on the Gaza border and was devastated on October 7.

He says “ uncle Brian, what’s happening ?” I have no answer