Huesos777909 (huesos777909)

Huesos777909

21 y.o LIZA menya zovut vsem pivet

14 Followers

Recent casts

This means that there are fewer geographical restrictions than when using centralized alternatives. If someone sells what you want and accepts a payment method that you can provide, then you're done. You will need a wallet to use DEX.

  • 0 replies
  • 0 recasts
  • 1 reaction

Instead of using trusted third parties to protect funds in a transaction, they use a code. The seller's ETH will be transferred only when payment is guaranteed. This type of code is known as a smart contract.

  • 0 replies
  • 0 recasts
  • 1 reaction

What is DEX? Decentralized exchanges are open trading platforms for ETH and other tokens. They connect buyers and sellers directly.

  • 0 replies
  • 1 recast
  • 1 reaction

Top casts

The expectation is that the recipient will inadvertently copy the hacker's address from the transaction history and send money to the attacker, and not to the counterparty with similar details.

  • 0 replies
  • 0 recasts
  • 1 reaction

Such an incident occurred on May 3, 2024. The attackers managed to withdraw 1,155 "wrapped" Bitcoins (wBTC) worth $68 million from the wallet of a large investor. The coins were sent to the address 0xd9A1C3788D81257612E2581A6ea0aDa244853a91 and subsequently distributed to several digital accounts.

  • 0 replies
  • 0 recasts
  • 0 reactions

The company disclosed details of the investigation in a report for Cointelegraph. After conducting a detailed analysis of the incident, Match Systems discovered data that allowed them to quickly identify the kidnapper.

  • 0 replies
  • 0 recasts
  • 0 reactions

Incident history One of the most common types of hacker activity is the "dust attack" (dandruff attack). It involves sending small amounts of digital coins to thousands of wallets.

  • 0 replies
  • 0 recasts
  • 1 reaction

Onchain profile

Ethereum addresses