Home Technical Lisk Vulnerability: How to Steal Millions in 2^64 OperationsTechnicalLisk Vulnerability: How to Steal Millions in 2^64 OperationsBy Jean-Pierre Aumasson - 14/08/20182Facebook Twitter Pinterest WhatsApp The English language original of this post is published at Kudelski Security. Please read it there!RELATED ARTICLESMORE FROM AUTHOR GuidesAdding Web3 Logins to a Web2 App – Part 2 ToolsDon’t Track Web3 – How Private is your Multi-account Mobile Wallet? OpinionCan Blockchain Be Used to Fix Elections? OpinionThink Twice before Giving That ICO Project Your KYC Data CrimeWhat Is A “Bitcoin Mixer” and What Is A “Cryptocurrency Tumbler”? ToolsTracking Your Crypto Portfolio with Coink2 COMMENTSThis is covered by sending at least one transaction after creating a wallet. This is old. ReplyAs this does not happen automatically, and some accounts in that list are still unsecured, it is by no means a solved problem. ReplyLEAVE A REPLY Cancel replyPlease enter your comment! Please enter your name here You have entered an incorrect email address!Please enter your email address here Save my name, email, and website in this browser for the next time I comment.
As this does not happen automatically, and some accounts in that list are still unsecured, it is by no means a solved problem. Reply
This is covered by sending at least one transaction after creating a wallet.
This is old.
As this does not happen automatically, and some accounts in that list are still unsecured, it is by no means a solved problem.