I have a question: is it possible to write scripts to do the above automatically? Or does it have to be a manual process?
Few people understand the ecosystem thoroughly (I admit that I do not), so few people can implement the manual process properly. One mistake equals 0 privacy.
Also, would they be allowed to use renVM since everyone knew that these accounts contained bad bitcoin?
It is possible to write scripts to do this automatically, and randomized activity.
There is a push for more and more permissionless bridges. All the bridge builders and their communities shy away from that obvious discussion because they do host and earn basis points from any crypto that passes over the bridge, even if it is obviously from a heist. It would put a bridge, especially that bridge, in a tough spot if these hackers did too much too soon, the hackers would have needed to be watching bridge technology and from this indictment it just looks like they werent.
I have a question: is it possible to write scripts to do the above automatically? Or does it have to be a manual process?
Few people understand the ecosystem thoroughly (I admit that I do not), so few people can implement the manual process properly. One mistake equals 0 privacy.
Also, would they be allowed to use renVM since everyone knew that these accounts contained bad bitcoin?