Capt'n CryptObvious (@phanaero) 's Twitter Profile
Capt'n CryptObvious

@phanaero

Co-Founder & Chief Scientist @SkyProtocolOrg & @MutualKnowledge
Phanæro: apparent, obvious, duh—antonym of "crypto"
Computing: @ngnghm. Other: @fare.

ID: 982634939333083136

linkhttps://mukn.com/fare calendar_today07-04-2018 15:03:20

539 Tweet

600 Followers

133 Following

Tay 💖 (@tayvano_) 's Twitter Profile Photo

Crypto folks (hopefully) already know that Lazarus is one of the most prevalent threat actors targeting this industry. They rekt more people, companies, protocols than anyone else. But it's good to know exactly how they get in. Bc another smart contract audit won't save you.

Luca Beurer-Kellner (@lbeurerkellner) 's Twitter Profile Photo

👿 MCP is all fun, until you add this one malicious MCP server and forget about it. We have discovered a critical flaw in the widely-used Model Context Protocol (MCP) that enables a new form of LLM attack we term 'Tool Poisoning'. Leaks SSH key, API keys, etc. Details below 👇

👿 MCP is all fun, until you add this one malicious MCP server and forget about it.

We have discovered a critical flaw in the widely-used Model Context Protocol (MCP) that enables a new form of LLM attack we term 'Tool Poisoning'.

Leaks SSH key, API keys, etc.

Details below 👇
zooko🛡🦓🦓🦓 ⓩ (@zooko) 's Twitter Profile Photo

Wow! Wow wow wow! I think Sean Bowe’s “Project Tachyon” may be an historic breakthrough in achieving global consensus with minimal shared state, by leveraging the power of Proof-Carrying Data (an application of recursive zero-knowledge proofs). x.com/ebfull/status/… ⤵️

Students For Liberty (@sfliberty) 's Twitter Profile Photo

It’s bold. It’s nationalist. It’s flawed. Because you can’t tariff your way to prosperity. And you can’t revive American industry without fixing what’s broken at home. The enemy isn’t foreign competition. It’s big government.

jake (@jakegallen_) 's Twitter Profile Photo

Before I share details about my personal experience and who is involved, first allowing some security teams to work through their process, i'd like to share with you the tactics used to take COMPLETE CONTROL of your computer. ↓This setting is ON by DEFAULT on Zoom

Ameen Soleimani (@ameensol) 's Twitter Profile Photo

is there anyone trying to make Ethereum *less* complex? or are we just adding things without realizing that each new thing requires maintenance and cognitive overhead for new entrants to learn about? at some point we're going to collapse under the weight of our own complexity

Capt'n CryptObvious (@phanaero) 's Twitter Profile Photo

zooko🛡🦓🦓🦓 ⓩ This is great, but better thought of as a tradeoff between space and time: instead of consulting an ever growing database of data, you continuously update your proofs. Proofs allow you to trim the data, and the longest delay between updates determines how much data you must keep.

nick.eth (@nicksdjohnson) 's Twitter Profile Photo

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:
Jameson Lopp (@lopp) 's Twitter Profile Photo

The father of a crypto millionaire was kidnapped in broad daylight in Paris on Thursday. Similar to the David Balland attack, a ransom of 5M EUR was demanded and one of the victim's fingers was amputated. lemonde.fr/en/france/arti…

Nic (@nicrypto) 's Twitter Profile Photo

This is wild. - 2 months ago: Ledger co-founder kidnapped in France. They chop off his finger in an attempt to extort his co-founder. - 1 week ago: Father of a crypto influencer is abducted in France. They chop of his finger in an attempt to extort his son. - Today: People

Adam Cochran (adamscochran.eth) (@adamscochran) 's Twitter Profile Photo

Unbelievable. When I was a director of an exchange in 2013, one of the first security policies I set up was: -Once KYC/AML was approved it was printed out. -One copy went to a fireproof filing cabinet at main office with the compliance lead. -One copy went to secure offsite

Unbelievable.

When I was a director of an exchange in 2013, one of the first security policies I set up was:

-Once KYC/AML was approved it was printed out.
-One copy went to a fireproof filing cabinet at main office with the compliance lead.
-One copy went to secure offsite
Capt'n CryptObvious (@phanaero) 's Twitter Profile Photo

Patrick Tobler of masumi.network envisions a future where you hire an AI that then enrolls more specialized AI agents to do all kinds of tasks.

Roman Storm 🇺🇸 🌪️ (@rstormsf) 's Twitter Profile Photo

😔💔 I’m Roman Storm. I poured my soul into Tornado Cash—software that’s non-custodial, trustless, permissionless, immutable, unstoppable. In 31 days, I face trial. The DOJ wants to bury DeFi, saying I should’ve controlled it, added KYC, never built it. SDNY is trying to crush

nic carter (@nic__carter) 's Twitter Profile Photo

in singapore last year i gave a talk called "cryptodollarization". the idea is dollarization via stablecoins. now with the GENIUS act about to pass and bessent's comments about stables reaching $3.7T (!!) (13% of M3), i believe stablecoins are being unleashed as an economic

in singapore last year i gave a talk called "cryptodollarization". the idea is dollarization via stablecoins. now with the GENIUS act about to pass and bessent's comments about stables reaching $3.7T (!!) (13% of M3), i believe stablecoins are being unleashed as an economic
Mehdi Farooq (@mehdifarooq2) 's Twitter Profile Photo

One minute I was prepping for a Zoom call. Ten minutes later, large part of my life savings were gone. It started with a message on Telegram from Alex Lin — someone I knew. He wanted to catch up. I shared my Calendly link. He booked a slot for the next day. A few minutes

One minute I was prepping for a Zoom call. Ten minutes later, large part of my life savings were gone.

It started with a message on Telegram from Alex Lin — someone I knew. He wanted to catch up.

I shared my Calendly link.
He booked a slot for the next day.

A few minutes
Dr. Maalouf ‏ (@realmaalouf) 's Twitter Profile Photo

This was Aida Rostami, an Iranian doctor who was tortured and murdered by the Islamic regime for treating protesters against the regime. Her body was full of fractures, her nose was broken, her left eye was gouged, and her shoulders were crushed. Free Iran from Islamists!

This was Aida Rostami, an Iranian doctor who was tortured and murdered by the Islamic regime for treating protesters against the regime.

Her body was full of fractures, her nose was broken, her left eye was gouged, and her shoulders were crushed.

Free Iran from Islamists!
zooko🛡🦓🦓🦓 ⓩ (@zooko) 's Twitter Profile Photo

Fun historical story that most people don’t know: when the US National Institutes of Standards and Technology selected Keccak to be the new Secure Hash Algorithm (SHA3), they knew that it was inefficient—that it did a lot computation that wasn’t necessary for security. ⤵️

zooko🛡🦓🦓🦓 ⓩ (@zooko) 's Twitter Profile Photo

So, due to the widespread and well-founded suspicion about their proposal to optimize SHA3, NIST reversed course and announced that the original, overengineered Keccak would be the final SHA3 standard. ⤵️