Zeke Fox
👤 PersonAppearances Over Time
Podcast Appearances
Like those are now dirty wallet addresses. And if you try and send it to another wallet anonymous to clean it up, people can still see that it won't really work. So there are techniques that the criminals use to try to launder their dirty crypto. But once like your money is kind of identified as dirty crypto, it becomes hard for you to spend it. Like you might remember,
razzle con the terrible rapping hacker um yeah tell us about them real quick so these guys they previously held the record for like biggest bitcoin exchange heist it turned out it was this couple who lived in a financial district the woman went by razzle con and she had actually recorded like epically terrible raps in which she talked about like her social engineering skills and
razzle con the terrible rapping hacker um yeah tell us about them real quick so these guys they previously held the record for like biggest bitcoin exchange heist it turned out it was this couple who lived in a financial district the woman went by razzle con and she had actually recorded like epically terrible raps in which she talked about like her social engineering skills and
razzle con the terrible rapping hacker um yeah tell us about them real quick so these guys they previously held the record for like biggest bitcoin exchange heist it turned out it was this couple who lived in a financial district the woman went by razzle con and she had actually recorded like epically terrible raps in which she talked about like her social engineering skills and
So they got caught. They're, I think, awaiting prison right now. But they stole Bitcoin that, at the time they were caught, was worth like $3 or $5 billion. But they were only ever able to spend a tiny fraction of it because that metaphorical die pack had gone off. So in the case of a Trump coin... Right now, I'll give you an example.
So they got caught. They're, I think, awaiting prison right now. But they stole Bitcoin that, at the time they were caught, was worth like $3 or $5 billion. But they were only ever able to spend a tiny fraction of it because that metaphorical die pack had gone off. So in the case of a Trump coin... Right now, I'll give you an example.
So they got caught. They're, I think, awaiting prison right now. But they stole Bitcoin that, at the time they were caught, was worth like $3 or $5 billion. But they were only ever able to spend a tiny fraction of it because that metaphorical die pack had gone off. So in the case of a Trump coin... Right now, I'll give you an example.
There is a wallet that acquired a million dollars of Trump coin possibly before he ever tweeted about it. And so That person sold the Trump coin and made about $180 million in profit. Wow. And me and my colleagues did some digging on this. Even though you could see this on the blockchain, we weren't able to identify who this person was.
There is a wallet that acquired a million dollars of Trump coin possibly before he ever tweeted about it. And so That person sold the Trump coin and made about $180 million in profit. Wow. And me and my colleagues did some digging on this. Even though you could see this on the blockchain, we weren't able to identify who this person was.
There is a wallet that acquired a million dollars of Trump coin possibly before he ever tweeted about it. And so That person sold the Trump coin and made about $180 million in profit. Wow. And me and my colleagues did some digging on this. Even though you could see this on the blockchain, we weren't able to identify who this person was.
A researcher on Twitter who goes by Bubble Maps was able to track down through the person had... transacted with some sort of known wallet at some point they identified this trader as an anonymous person who goes by nasim and nasim claims he did not have inside information um but we still don't know who nasim is so like this crypto tracing only kind of goes so far
A researcher on Twitter who goes by Bubble Maps was able to track down through the person had... transacted with some sort of known wallet at some point they identified this trader as an anonymous person who goes by nasim and nasim claims he did not have inside information um but we still don't know who nasim is so like this crypto tracing only kind of goes so far
A researcher on Twitter who goes by Bubble Maps was able to track down through the person had... transacted with some sort of known wallet at some point they identified this trader as an anonymous person who goes by nasim and nasim claims he did not have inside information um but we still don't know who nasim is so like this crypto tracing only kind of goes so far
Yeah. So the exchange said that they had been holding this crypto in what's called a multi-sig cold wallet. And what this means is that it's a little like in the movie when you need like three people's key to activate the nuclear missile. These multisig wallets will not, you can't send crypto out of them unless two or more of the people who control the wallet successfully authenticate themselves.
Yeah. So the exchange said that they had been holding this crypto in what's called a multi-sig cold wallet. And what this means is that it's a little like in the movie when you need like three people's key to activate the nuclear missile. These multisig wallets will not, you can't send crypto out of them unless two or more of the people who control the wallet successfully authenticate themselves.
Yeah. So the exchange said that they had been holding this crypto in what's called a multi-sig cold wallet. And what this means is that it's a little like in the movie when you need like three people's key to activate the nuclear missile. These multisig wallets will not, you can't send crypto out of them unless two or more of the people who control the wallet successfully authenticate themselves.
You would think it would be very hard for hackers to get that money out of there. I don't think it's been revealed how they did it actually. In the past, some of these hacks that appeared pretty sophisticated technically, it's turned out that the hackers used social engineering. As Razzlecon rapped in one song, spearfish your password, all your funds transferred. So...
You would think it would be very hard for hackers to get that money out of there. I don't think it's been revealed how they did it actually. In the past, some of these hacks that appeared pretty sophisticated technically, it's turned out that the hackers used social engineering. As Razzlecon rapped in one song, spearfish your password, all your funds transferred. So...
You would think it would be very hard for hackers to get that money out of there. I don't think it's been revealed how they did it actually. In the past, some of these hacks that appeared pretty sophisticated technically, it's turned out that the hackers used social engineering. As Razzlecon rapped in one song, spearfish your password, all your funds transferred. So...
The multisig makes it harder, but if I get two people to open my junk email and install malware on their computer, I might be able to steal both of their passwords and transfer this crypto out. I mean, the amount of money that's there to be stolen is so big that it justifies a huge amount of effort by these hackers.