-

@ El_monty
2025-02-26 12:31:06
Following this hack I ended up here https://www.reddit.com/r/ethereum/comments/1iuxkmv/how_bybit_could_have_prevented_this_hack_but_didnt/
It's interesting that in typical eth style the solutions require layering additional complexity and possible more attack surface.
1. Signers blindly approved a malicious transaction - yeah I wonder why, probably because the HW couldn't just say sign x amount to move to x!?
2. No second-layer verification for transactions - again no questions why, once they're going to external sites the only thing the hw wallet is really doing is protecting the key
3. No transaction simulation before signing - I mean not a bad idea but if it wasn't so fucking complex why couldn't the HW do this... The coldwallet should only be moving funds from storage to another of your addresses why would it even need to do anything particularly complex, surely it should be the same every time you do it?
4. No withdrawal delays for large transactions - yeah that should be probably part of the process, this being eth they probably mean adding more complexity to the signing contract though!
5. No smart contract "Guardian" system - cool add another contract to get replaced/hacked!
6. No anomaly detection or security alerts - The anomaly did get detected, its all gone LOL!