Bitcoin Forum
July 18, 2024, 05:26:41 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: hijacked contract-adresses  (Read 102 times)
Mankov (OP)
Jr. Member
*
Offline Offline

Activity: 426
Merit: 7


View Profile
February 23, 2018, 02:03:36 PM
Last edit: February 23, 2018, 02:41:01 PM by Mankov
 #1

Hello,

is it possible, that someone can hijack a original contractadress on a decentrialised exchange, like etherdelta?
Even ift it would show the right contract-adress, could it be a fake?

For example Gladius Token... Is it the original token? https://forkdelta.github.io/#!/trade/0x71d01db8d6a2fbea7f8d434599c237980c234e4c-ETH

It`s the right contract-adress, but could it be a fake, too?


mazdafunsun
Full Member
***
Offline Offline

Activity: 490
Merit: 123



View Profile
February 23, 2018, 02:16:14 PM
 #2

Yeah. if your pc is compromised - malicious actors can swap address. Some web-to-TOR relay done that with ransomware payment pages. swapped legit BTC address with other.
https://www.bleepingcomputer.com/news/security/tor-to-web-proxy-caught-replacing-bitcoin-addresses-on-ransomware-payment-sites/

Mankov (OP)
Jr. Member
*
Offline Offline

Activity: 426
Merit: 7


View Profile
February 23, 2018, 02:40:25 PM
 #3

Oh, good to know.... Embarrassed

I`m considering trading on a linux, because it`s not so under the radar of hackers
xiaohang07
Sr. Member
****
Offline Offline

Activity: 392
Merit: 253


Open and Transparent Science Powered By Blockchain


View Profile
February 23, 2018, 03:58:21 PM
 #4

Hello,

is it possible, that someone can hijack a original contractadress on a decentrialised exchange, like etherdelta?
Even ift it would show the right contract-adress, could it be a fake?

For example Gladius Token... Is it the original token? https://forkdelta.github.io/#!/trade/0x71d01db8d6a2fbea7f8d434599c237980c234e4c-ETH

It`s the right contract-adress, but could it be a fake, too?



The smart contract itself can be not hijacked, only the front end or the interface can be hijacked. I think when the SWARM and IFPS protocols are matured enough, the crypto space will become more secure.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!