paint-brush
A run-down of common individual crypto hacks in 2019by@viewnodes
640 reads
640 reads

A run-down of common individual crypto hacks in 2019

by Viewnodes4mFebruary 11th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The year thus far has brought with it a slew of publicity regarding large scale exchange hacks and exit scams, and we’re only in February. With that said, something rarely is reported on is the hacking of individual-owned crypto assets, through a variety and ever more complex set of methods employed by nefarious actors exploiting the immutability and pseudonymity of cryptocurrency transactions. These features, while extraordinary in their ability to financially empower individuals, allow bad actors to avoid much chance of repercussion for the theft of cryptocurrency, which acts as an enormous deterrent for victims to ever consider using public blockchains in the future. The methods employed to separate legitimate crypto owners from their assets have evolved with the blockchains themselves, so it is worth examining some of the most common hacks people are being targeted with at present with explanations for how these might happen. Below is a list of four such methods, which all see bad actors utilize in 2019.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A run-down of common individual crypto hacks in 2019
Viewnodes HackerNoon profile picture
Viewnodes

Viewnodes

@viewnodes

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Buff
Ledger
Ledger