zlacker

[parent] [thread] 3 comments
1. throwa+(OP)[view] [source] 2025-01-22 01:55:42
Until now I oddly never questioned how any government could seize someone's bitcoin and how a government keeps the private keys of their crypto wallets secure.
replies(1): >>yieldc+r2
2. yieldc+r2[view] [source] 2025-01-22 02:12:40
>>throwa+(OP)
a lot of known best practices were not followed in 2013.

Every advancement in crypto was done after the government made a move. And all subsequent moves netted the government less.

Now it takes more agencies to seize darknet markets, and most merchants and consumers get their money back because it was a multisignature transaction and the server stored nothing. Even domains have been seized back from the government.

The crypto space calls it "antifragility", as in the idea - and now history - that the asset class and infrastructure improves under pressure.

replies(1): >>dmix+Fn
◧◩
3. dmix+Fn[view] [source] [discussion] 2025-01-22 05:29:34
>>yieldc+r2
> a lot of known best practices were not followed in 2013.

like Secret Service and DEA agents getting immediately caught trying to steal Bitcoin from Silk Road?

https://www.usatoday.com/story/news/2015/03/30/federal-agent...

replies(1): >>yieldc+Zt
◧◩◪
4. yieldc+Zt[view] [source] [discussion] 2025-01-22 06:34:21
>>dmix+Fn
Yes, like that

I was referring to hot and cold wallet practices, methods for unlinking transaction activity from your KYC’d funds, and the immaturity of multi-signature at the time

[go to top]