I believe that the Monero CCS hack was done by the feds/elites/establishment in order to cause distrust. Whoever you believe controls the world or the West I suppose. We all know that whoever they are, they hate freedom with passion and especially things like Monero
You can view the extensive story of the CCS hack in this Github Issue:
https://github.com/monero-project/meta/issues/916
The TLDR is that the one of the wallets used by the Monero devs to host community funds for CCS projects got swept out somehow. They were using Microsoft Windows and Ubuntu computers so it would have been very easy for a backdoor to happen. Also both Luigi and FluffyPony both had access to the seed before and after fluffy's arrest, so they could have gotten that seed somehow, i dont know if there was a search of his physical belongings. There are multiple ways that they gotten to the private keys, easily. The OpSec was pretty weak. And the wallet was sitting for several years, so that is plenty of time for an underhanded attack.
Introducing Moonstone research. This is a blockchain analytics company started by the former Vice President of Operations at Cake wallet, Justin Ehrenhofer, active on Reddit as u/SamsungGalaxyPlayer. SamsungGalaxyPlayer is his github, and you can see him commenting on the github issue above. Below are his company site, Personal site, and Github account
https://moonstoneresearch.com/
https://ehrenhofer.org/
https://github.com/SamsungGalaxyPlayer
His company markets to law enforcement and wants to assist them. He is a filthy little snitch. He is not using his company to help Monero, he just wants to make a proprietary tool to pretend like he can trace Monero (which he cannot). In my personal opinion it is likely he is using his ties to Cake Wallet to siphon info from their Monero remote nodes to help trace it for feds. Cake Wallet has always given me major honeypot vibes outside of this. Just an intuition you get as a cypherpunk after many years.. Their wallet is very low OpSec.
Now, comes along this moonstone guy, and suddenly he knows the Transaction ID of the attacker's transaction. Below you can read his full report.
https://moonstoneresearch.com/2023/11/03...-Hack.html
Firstly, on the github issue, you can see that a whopping NINE TRANSACTIONS happened in the space of less than 10 minutes!! (September 1 11:58pm - September 2 12:07am, 2023). Obviously this would make Monero extremely traceable! As we all know, we are to wait a bare minimum of 20 minutes between each transaction. Only a total imbecile would do this, and someone who can do such an attack is not an imbecile. Why would the attacker use 9 transactions? Why not just one? And why would he make them easy to trace?
Secondly, looking into the Moonstone research report, here you can see that he finds the Monerujo Pocket Change feature being used. For those who don't know, it is a feature in the Monerujo mobile wallet that attempts to avoid the 20 minute wait time between transfers by manipulating inputs. It creates irregularities that allows him to trace even further. Why would a sophisticated attack stealing large amounts of money be using this feature? And why the hell would he be using a mobile wallet?
As you can see, none of this makes sense. It's almost as if that the attacker wanted to be traced.
This is a reddit post I found where some smart individuals talk about the suspicious nature of the attack (Onion based Redlib instance for viewing Reddit):
http://redlib.catsarchywsyuss6jdxlypsw5d...?context=3
> Ah is just this eisenpepper guy flexing his new Mossad Israeli backed tracking firm. He had another one before cypher-something, seems to be gone out of business. Nothing new. He didnt trace shit again , just the monerujo pocket change feature which isnt official. If the thief (not a hacker) used one single trasaction nobody would be able to trace a single letter.
> is this a setup by those of us who are also part of the intelligence community?
Market is ready to go much higher. Boom. Monero is traceable in some edge cases. We already knew that ring number, ring selection and poisoning are the weakest link. Some shiny new LLC with no proper address comes alive.
I don't believe in coincidences, when market manipulation is an obvious motif.
And the "attacker" uses exactly the one mobile tool that enables tracing. Suspect.
> Yea it's placed and timed on purpose. The wallet was emptied in the beginning of September , so everyone was two months quiet?
Now suddenly the news come out , big drama on reddit and twitter, right when the market started moving , xmr out of that resistance. Here comes eisenpepper and that blec guy with their "analysis".
> I thought the same: why would a hacker use a mobile wallet? That is so strange
I agree with them. All very suspicious. And suddenly after this, people on lemmy, reddit, twitter, blogs, all saying things like "Oh yes it seems Monero can be traced". No, it cannot, but this attack was an attempt to cause a seed planted in the minds of the community to spread doubt and fear.
One last thing - Why has Monerujo not gotten any attention? Why are they continuing to use a feature which helps to trace your transactions? Why do they not warm about using it in the wallet as a pre-warning? Are Monerujo just lazy, or are they aiding all this under our noses??
Remember that above all, FEAR is their ultimate tool. They do not have actually any real power, only the power of lies, which creates fear. Fear comes from lack of knowing, from the unknown. And they use this against all who oppose them as a means of control.
You can view the extensive story of the CCS hack in this Github Issue:
https://github.com/monero-project/meta/issues/916
The TLDR is that the one of the wallets used by the Monero devs to host community funds for CCS projects got swept out somehow. They were using Microsoft Windows and Ubuntu computers so it would have been very easy for a backdoor to happen. Also both Luigi and FluffyPony both had access to the seed before and after fluffy's arrest, so they could have gotten that seed somehow, i dont know if there was a search of his physical belongings. There are multiple ways that they gotten to the private keys, easily. The OpSec was pretty weak. And the wallet was sitting for several years, so that is plenty of time for an underhanded attack.
Introducing Moonstone research. This is a blockchain analytics company started by the former Vice President of Operations at Cake wallet, Justin Ehrenhofer, active on Reddit as u/SamsungGalaxyPlayer. SamsungGalaxyPlayer is his github, and you can see him commenting on the github issue above. Below are his company site, Personal site, and Github account
https://moonstoneresearch.com/
https://ehrenhofer.org/
https://github.com/SamsungGalaxyPlayer
His company markets to law enforcement and wants to assist them. He is a filthy little snitch. He is not using his company to help Monero, he just wants to make a proprietary tool to pretend like he can trace Monero (which he cannot). In my personal opinion it is likely he is using his ties to Cake Wallet to siphon info from their Monero remote nodes to help trace it for feds. Cake Wallet has always given me major honeypot vibes outside of this. Just an intuition you get as a cypherpunk after many years.. Their wallet is very low OpSec.
Now, comes along this moonstone guy, and suddenly he knows the Transaction ID of the attacker's transaction. Below you can read his full report.
https://moonstoneresearch.com/2023/11/03...-Hack.html
Firstly, on the github issue, you can see that a whopping NINE TRANSACTIONS happened in the space of less than 10 minutes!! (September 1 11:58pm - September 2 12:07am, 2023). Obviously this would make Monero extremely traceable! As we all know, we are to wait a bare minimum of 20 minutes between each transaction. Only a total imbecile would do this, and someone who can do such an attack is not an imbecile. Why would the attacker use 9 transactions? Why not just one? And why would he make them easy to trace?
Secondly, looking into the Moonstone research report, here you can see that he finds the Monerujo Pocket Change feature being used. For those who don't know, it is a feature in the Monerujo mobile wallet that attempts to avoid the 20 minute wait time between transfers by manipulating inputs. It creates irregularities that allows him to trace even further. Why would a sophisticated attack stealing large amounts of money be using this feature? And why the hell would he be using a mobile wallet?
As you can see, none of this makes sense. It's almost as if that the attacker wanted to be traced.
This is a reddit post I found where some smart individuals talk about the suspicious nature of the attack (Onion based Redlib instance for viewing Reddit):
http://redlib.catsarchywsyuss6jdxlypsw5d...?context=3
> Ah is just this eisenpepper guy flexing his new Mossad Israeli backed tracking firm. He had another one before cypher-something, seems to be gone out of business. Nothing new. He didnt trace shit again , just the monerujo pocket change feature which isnt official. If the thief (not a hacker) used one single trasaction nobody would be able to trace a single letter.
> is this a setup by those of us who are also part of the intelligence community?
Market is ready to go much higher. Boom. Monero is traceable in some edge cases. We already knew that ring number, ring selection and poisoning are the weakest link. Some shiny new LLC with no proper address comes alive.
I don't believe in coincidences, when market manipulation is an obvious motif.
And the "attacker" uses exactly the one mobile tool that enables tracing. Suspect.
> Yea it's placed and timed on purpose. The wallet was emptied in the beginning of September , so everyone was two months quiet?
Now suddenly the news come out , big drama on reddit and twitter, right when the market started moving , xmr out of that resistance. Here comes eisenpepper and that blec guy with their "analysis".
> I thought the same: why would a hacker use a mobile wallet? That is so strange
I agree with them. All very suspicious. And suddenly after this, people on lemmy, reddit, twitter, blogs, all saying things like "Oh yes it seems Monero can be traced". No, it cannot, but this attack was an attempt to cause a seed planted in the minds of the community to spread doubt and fear.
One last thing - Why has Monerujo not gotten any attention? Why are they continuing to use a feature which helps to trace your transactions? Why do they not warm about using it in the wallet as a pre-warning? Are Monerujo just lazy, or are they aiding all this under our noses??
Remember that above all, FEAR is their ultimate tool. They do not have actually any real power, only the power of lies, which creates fear. Fear comes from lack of knowing, from the unknown. And they use this against all who oppose them as a means of control.