Leicester
๐ค SpeakerVoice Profile Active
This person's voice can be automatically recognized across podcast episodes using AI voice matching.
Appearances Over Time
Podcast Appearances
If you connect your, your wallet to a D app that's been compromised, or that is attached to a node that is compromised or is attached itself to the chain, but the chain has been compromised at a point, then your assets could be drained.
So depending on where that compromise is happening,
Your wallet could be affected.
You, the physical, you would not be, but your assets, your stored assets could be recently.
I talked about Monero and the 51% attack.
The 51% attack is a type of Sybil attack.
It simply means that an operator, a node operator is able to control at least 51% or more of the entirety of the network.
And when that happens,
It allows them to essentially control what's going on.
Now, in that case, they weren't doing it for malicious reasons.
They were doing it to use the value of Monero to enrich their own token product.
And they tried to Monero and said, we're just showing you we can do this because you're compromised, right?
Kind of like an ethical hacker, but they were trying to enrich themselves at the same time because it allowed them to influence the price of Monero by doing that.
So that's a form of civil attack.
That's easy to understand how many node operators do single actors control, or you have a bunch of malicious actors in collusion with each other to do the same influence.
This is the same negative impact.
now if you think about what i just said there a number of different malicious actors running notes let's make up a scenario and again any sort of similarity or connection to real world events or entities is purely speculative and not real right but let's make up some scenarios let's say you have an entity formed as an llc
that creates a Dow and I'll pick a United state at random, let's say Wyoming.
Right.
And they create, or they plan to create no, at least one node that they're going to run nodes.