The reason why the hacker can do that is because ronin bridge requires only 5 out of 9 keys. The hacker got 5.
And the solution is to increase the number of approval requirement to 8.
There was a backdoor and this discovered by the hacker. In this case the team was also making a big mistake by not doing regular checking.
They did know their ronin got hacked a week after. This is also the worst part in this case.
Here is the problem with that issue.
Someone withdrawing 1 eth and someone withdrawing 200k eth need to be approved by the same number of nodes.
Basically, this is not a problem but the problem is the backdoor let the hacker sign malicious signature. The privatekey leaked and it got hacked.
Does that even make sense?
that makes sense. BSC was also using small amounts of node as well.
Surely there should be more security for larger amount of money.
In fact, an address should be prevented from receiving say more than 100 ETH per hour unless it has a special permissions, for example.
It will make the dapps become capps (centrazed application)
People can do whatever they want with their money. In this case the dev is having responsibility to take care with regular audit to its security to ensure the network was safe.