A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53224 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53224 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
Relevant
Hot
New
Spam
Relevant
Hot
New
Spam
0
652
0
652
>"The working theory is that an attacker somehow exfiltrated these logs and were able to use this to compromise the users. This is still an ongoing investigation, and current evidence does not explain all of the compromised accounts."
>"The working theory is that an attacker somehow exfiltrated these logs and were able to use this to compromise the users. This is still an ongoing investigation, and current evidence does not explain all of the compromised accounts."
Some low-ranking comments may have been hidden.
Some low-ranking comments may have been hidden.