Subscribe to finance123.eth
Subscribe to finance123.eth
<100 subscribers
<100 subscribers
Share Dialog
Share Dialog
Twitter user yannickcrypto.eth discovered that two addresses had deposited 0.1ETH each for about 700 separate addresses before the Ethernet Domain Name System (ENS) went public with its airdrop program, and then registered a separate ENS address as a way to get the ENS airdrop. The funds for these two addresses were first transferred from OKEx and the manipulation of these addresses occurred between 2 and 4 weeks ago. Nick Johnson, the core developer of ENS, responded to the incident in a tweet, giving four options: do nothing; snapshot the time earlier; add more conditions to remove more accounts; and manually blacklist these addresses. He sees some problems with the first three, so they are currently opting for the fourth way, manually blacklisting these addresses, which will not receive airdrops from ENS.
Twitter user yannickcrypto.eth discovered that two addresses had deposited 0.1ETH each for about 700 separate addresses before the Ethernet Domain Name System (ENS) went public with its airdrop program, and then registered a separate ENS address as a way to get the ENS airdrop. The funds for these two addresses were first transferred from OKEx and the manipulation of these addresses occurred between 2 and 4 weeks ago. Nick Johnson, the core developer of ENS, responded to the incident in a tweet, giving four options: do nothing; snapshot the time earlier; add more conditions to remove more accounts; and manually blacklist these addresses. He sees some problems with the first three, so they are currently opting for the fourth way, manually blacklisting these addresses, which will not receive airdrops from ENS.
No activity yet