Hacker Newsnew | past | comments | ask | show | jobs | submit | aj3's commentslogin

The strategy that MEV bots use is not a law. It is not even defined or endorsed by Ethereum standards, and arguably is not an intended feature of the network.

You could alternatively claim that the guys defined their own protocol which addressed market inefficiency (which MEV is). Imo it's insane to claim that a trading technique you invented should have zero risk, and any losses you take are an indication of theft.


To my knowledge, the imprecision of the CFAA is sufficient to prosecute them.


> Tokens are property.

What law says this? Technically, tokens are smart contracts, basically OOP classes with both data and behavior. They also by design have public methods which are meant to be triggered by anyone on the chain. It's not at all obvious that triggering these methods in an unexpected order or with unexpected data is breaking any laws whatsoever. It's bytecode anyway, so there's no human readable EULA's or explanations on what you're allowed to do with the token.


I bet this indictment will be used as a case study to justify the need for government oversight and taxation.


But you're not signing EULA's in order to participate in the network. Moreover, there are no real "laws / regulations" within the network either, specifying what you are or are not allowed to do. Ethereum standards merely determine how the software is supposed to work, but even then I'm sure Ethereum devs would oppose treating their docs as an agreement (because they don't offer any warranty, licensing or attestation). Moreover, there is an express goal to have a diverse set of software clients, so even developing your own software to be interoperable with existing standards can't be constructed as "an attack".

All this to say, I just fail to say how this can be constructed as "changing the terms of the transaction". There was no legal agreement between parties and no existing precedent to treat this as a malicious attack at all.

All I see is a Wall Street establishment pulling strings in order to protect their investment, by asking for a sudden government oversight in the system that was built with the express goal of not requiring any government oversight.


> asking for a sudden government oversight in the system that was built with the express goal of not requiring any government oversight.

Clearly, it has failed at that goal. This should not be surprising in the slightest.

Government gunna govern.


It's weird to consider paying taxes as a tradeoff. "Digital nomad" isn't a code for tax avoidance, is it?


No, its specific visa category that a few EU countries have now, the most popular being Portugal's. You pay plenty of taxes to the host economy and are usually excluded from social welfare and healthcare.


Cash leaves no trail.


Android has different security guarantees compared to desktop/server Linux. E.g. people should expect that none of the installed software can hijack the phone completely and that most damage from malware should be mitigateable by uninstalling malicious app.


People would be right to expect that no installed software can hijack the desktop completely as well, but unfortunately that is very much not the case.


There were over a dozen of 0day exploits this year alone. Some used in water hole style attacks, so not even that targeted. And these are state of the art incidents which would have pwned even users with all the updates installed.

After the patch has been pushed out, exploits become progressively cheaper so letting users to postpone security updates is a crime.


Ads, which is about running untrusted and usually hostile JS in your briwser, is the Pandora box of 0day exploits. Cut off ads, disable JS by default, and you'll solve 99% of 0days.


It's not user agent, it's session (cookies, localStorage) that they didn't have in Firefox, but still had in Chromium. And this isn't Google specific at all.


But they just said they cleared cookies.

Also I travel a fair share (used to) and never faced any issues with any other services except gmail.

It's too stringent to assume the same machine/storage/ip are always used.


Right. Session is stored either in cookies or in Local Storage. Both get cleared when you "clean cookies". If there is no device session, next time you're trying to log in, service will ask to show the second factor (so that hacker can't steal your account through finding the password on some other website).

Firefox didn't work, because person deleted session and didn't have second factor (nor backup auth methods). Chromium worked, because it still had device session.

I'm traveling and using TOR and VPNs just like everybody else and haven't faced any issues. There most definitely is a problem with communicating security/accessibility tradeoffs to the public though, so I'm not putting blame on the op here.


Most probably they've added MFA and lost it. Devices that have been authenticated already can be used with the bare login & password, but new sessions will ask for the MFA they can't access.


Well yeah. If the recovery process is weaker than regular authentication, that's what bad guys will use for account takeover. You don't want to lose Gmail because someone bruteforced your backup code?


It would not be weaker then usual authentication... you would still need username and password.

Not sure why companies nowadays rely on your tiny device to provide a second password. Both my passwords and 2FAs are on that device, what security does it add?

And why do they need a password if they are going to require Timestamped-2FAs anyways?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: