🚀 Cardano Network Experiences Temporary Split Due to Transaction Error
#Cardano #Blockchain #Cryptocurrency #ADA #NetworkSplit #Staking #TransactionError #CyberSecurity #AI #FBI #CharlesHoskinson #TechVulnerability
According to ChainCatcher, the Cardano network recently experienced a temporary chain split due to a 'malformed' delegated transaction. These transactions involve delegating ADA to a staking pool, which, while valid at the protocol level, can lead to code malfunctions affecting network functionality.
An event report from Cardano ecosystem organization Intersect revealed that the transaction exploited an old code vulnerability in Cardano's underlying software library, causing nodes to diverge in transaction processing methods, ultimately resulting in the network split. The vulnerability was triggered by Homer J, an ADA staking pool operator, who used AI-generated code to push the transaction and has admitted responsibility for the network split.
Staking pool operators have been instructed to download the latest version of the node software to resolve the issue and reintegrate the split chain into a complete blockchain. The temporary split has sparked debate within the Cardano community, with some arguing that Homer J's actions helped expose critical vulnerabilities, while others, including Cardano founder Charles Hoskinson, have labeled it an attack on the Cardano network. The FBI is now involved in the investigation.
A user humorously remarked, 'No one noticed Cardano's network partition because no one uses it.'#Cardano #Blockchain #Cryptocurrency #ADA #NetworkSplit #Staking #TransactionError #CyberSecurity #AI #FBI #CharlesHoskinson #TechVulnerability
🚀 Security Vulnerability Found in Mediatek Smartphone Chip
#SecurityVulnerability #Mediatek #SmartphoneChip #EMFI #ElectromagneticFaultInjection #MT6878 #AndroidSecurity #PhysicalAccess #PrivateKeys #Ledger #DonjonResearch #CodeExecution #ChipSecurity #MediatekResponse #HardwareWallets #CryptocurrencySecurity #PhysicalAttacks #TechVulnerability
According to ChainCatcher, Ledger's Donjon research team has demonstrated that electromagnetic fault injection (EMFI) can completely compromise a commonly used Mediatek smartphone chip, which is found in many Android phone models. This issue requires attackers to have physical access to the device, highlighting the risks faced by users storing private keys on smartphones.
Ledger stated that its team examined the Mediatek Dimensity 7300 (MT6878) chip produced by TSMC. Researchers used EMFI tools to disrupt the chip's boot ROM, successfully bypassing core security checks and gaining full control of the chip, allowing arbitrary code execution at the highest privilege level (EL3). Ledger emphasized that this discovery does not affect Ledger hardware wallets.
Ledger disclosed this vulnerability to Mediatek in May. Mediatek responded by stating that EMFI attacks are beyond the security scope of the MT6878 chip, which is designed for consumer products rather than financial or hardware security module applications. Mediatek also noted that devices with higher security requirements, such as encrypted hardware wallets, should include specialized defense measures.
The report comes at a time when physical attacks targeting cryptocurrency users are on the rise globally.#SecurityVulnerability #Mediatek #SmartphoneChip #EMFI #ElectromagneticFaultInjection #MT6878 #AndroidSecurity #PhysicalAccess #PrivateKeys #Ledger #DonjonResearch #CodeExecution #ChipSecurity #MediatekResponse #HardwareWallets #CryptocurrencySecurity #PhysicalAttacks #TechVulnerability
🚀 Expert Warns of Potential Vulnerability in Lightning Network Due to Quantum Computing
#LightningNetwork #QuantumComputing #Cryptography #CyberSecurity #Blockchain #CryptoSecurity #UdiWertheimer #NS3AI #PrivateKeyRisk #TechVulnerability #BTC
Udi Wertheimer has raised concerns about the structural vulnerability of the Lightning Network in the event that a cryptographically relevant quantum computer becomes capable of deriving private keys from public keys. According to NS3.AI, Wertheimer highlighted that the design of the Lightning Network necessitates the sharing of public keys and depends on third-party storage structures. This reliance could increase the risk of theft if quantum computing advances to the point where it can compromise cryptographic security.#LightningNetwork #QuantumComputing #Cryptography #CyberSecurity #Blockchain #CryptoSecurity #UdiWertheimer #NS3AI #PrivateKeyRisk #TechVulnerability #BTC