The Breakdown - How Crypto Is Fighting Back Against North Korea | The Breakdown

Episode Date: April 28, 2026

North Korea has had IT workers embedded in DeFi protocols since DeFi Summer — and they’re pretty good devs. Nick Bax, blockchain investigator and SEAL 911 incident responder, joins us to break do...wn how crypto crime has evolved from SIM swaps to nation-state social engineering. We unpack the Monero inflation bug, Arbitrum’s 9/12 multisig gold standard, how DPRK workers now use facilitators to rent real identities, and what it actually takes to break into onchain investigation. Enjoy! TIMESTAMPS: (00:00) Introduction (02:01) DeFi is Under Attack (03:11) Contagion Onchain (04:40) Nexo Ad (05:16) Nick Bax Interview (06:40) Incident Response Triage (08:43) Preemptive Due Diligence (10:20) From SIM Swaps To Remote Access (13:45) Multisig Best Practices (14:37) AI Speeds Up Attacks (15:36) Nexo Ad (17:14) Decentralization Tradeoffs (19:17) Monero Bug Hard Fork (20:05) Trusting Multisig Guardians (21:05) Two Of Five Risks (22:00) DeFi Decentralization Debate (23:41) Proactive Threat Hunting (25:25) DPRK Worker Red Flags (27:32) Security Teams And Intel (30:21) Thorchain And Laundering (33:26) Whack A Mole Reality (35:31) Becoming Onchain Investigator (37:06) Closing Thoughts FOLLOW GUEST › Nick Bax — https://x.com/bax1337 FOLLOW THE SHOW › David — https://x.com/dcanellis › The Breakdown — https://x.com/TheBreakdownBW SPONSORS › NEXO Nexo is the premier digital wealth platform. Receive interest on your crypto, borrow against it without selling, and trade a range of assets. Now available in the U.S with 30 days of exclusive privileges. Get started at http://nexo.com/breakdown Get top market insights and the latest in crypto news. Subscribe to the Blockworks Daily Newsletter: https://blockworks.co/newsletter/ DISCLAIMER As always, remember this podcast is for informational purposes only, and any views expressed by anyone on the show are solely their opinions, not financial advice.

Transcript
Discussion (0)
Starting point is 00:00:00 Somewhere between 10 and 25% of everything we look at is North Koreans. That's the really scary thing that came up and drift is like they had real people with real resumes that worked at real tech companies and got the developers to download malware. Every time we find a company and we ask them about them, we're like, hey, do you know these guys are like, yeah, they're pretty good devs. And then you like sort of show them the red flags for DPRK IT workers and they're like, oh, shit. You ask them about where they live. You know, you're like, oh, you're in Houston. What's a good restaurant in Houston? and they say, oh, there are no good restaurants here. It's like, come on, man.
Starting point is 00:00:34 This episode is brought to you by Nexo. Step into a new era of digital wealth. Earn interest on your digital assets, borrow against them without selling and trade all in one platform. Get started at nexo.com slash breakdown. Nothing said on the breakdown is a recommendation to buy or sell securities or tokens. This podcast is for informational purposes only and any views expressed by anyone in the show are opinions, not financial advice. Host and guests may hold positions in the company's funds or projects discussed. Crypto is really going through it.
Starting point is 00:00:58 On one hand, we have traditional finance finally starting to operate on chain. Hyperliquid is also gaining steam, and it's now quickly becoming a primary and central venue for weekend price discovery, particularly through oil perps. So on the surface, crypto seems to be evolving past its perception as some degenerate internet casino. What's grown into a weird mess of blockchains, protocols, exchanges, bridges and tokens actually has morphed into its own legitimate tech stack that has the world's biggest institutions practically one-shot it over the potential benefits of a tokenized financial system. We're just at the beginning of the tokenization of all assets, from real estate to equities, the bonds.
Starting point is 00:01:33 So we look at that as the next wave of opportunity for Blockbrock. But the crypto-native vision of an on-chain environment filled with Defi opportunities to earn yield, to activate capital and trustlessly hedge all sorts of different risks, is actively under attack. Can Defi survive? Let's see if we can figure it out. I'm your host David Cannellis, and this is the breakdown. Let's get to it. Over the last few weeks alone, we've heard a new cluster of incidents across DeFi. defy an adjacent crypto infrastructure, including major hits on protocols like Drift, Silo, Aether,
Starting point is 00:02:09 Hyperbridge, Raya, Zerion, and then Kelpdow, which at roughly $292 million was reported as the largest exploit of the year so far. And of course, it's not like there weren't any Defy exploits before this year, because there have always been these types of incidents. What's changing is that the threat model is clearly moving up the stack. A few years ago, Defy was considered risky because smart contracts should have catastrophic bugs. Then there were flash loan attacks and other quote-unquote highly profitable
Starting point is 00:02:33 trading strategies involving price oracles that could result in major losses. But the most recent wave of attacks on defy is much more threatening. Recent events have emphasized that fishing, compromised credentials and other operational failures who are driving a large share of losses alongside traditional exploits. So even if the code gets better, that does not mean that the system is secure. On top of the smart contract hacks, now developer teams have to think about access control, key management, wallet compromise, social engineering, misconfiguration, validation assumptions, cross-chain dependencies, front ends, team operational security, internal permissions,
Starting point is 00:03:06 liquidity routing. The list is effectively endless. Now, there is truth to the same as sometimes the hardest things are the ones most worth doing, and building a resilient DeFi ecosystem is incredibly difficult, especially one that prioritizes composability, the idea that everything plugs into everything. But composability is also what makes DeFi exploit so brutal. There is usually contagion to some degree, so the attacks are never really contained just to one protocol. It hits liquidity, it hits trust, it forces other protocols to react. Reporting around the kelp exploit, for example, tied it almost immediately to broader stress across defy liquidity and a major drawdown in RV deposits, dropping from over $45.5 billion to under $34 billion in four days.
Starting point is 00:03:48 With all of this in mind, Defy is clearly under attack most prominently by North Korean linked hacking crews like Lazarus. At the same time, it's worth making it clear that what's happening in crypto and defy right now is a preview of what happens when traditional finance becomes more composable, more internet native and more open, and we know that traditional finance is moving in this direction. So the matter at hand is not whether defy can ever be perfectly safe. It can't. No meaningful financial system is. The real issue is whether it can become secure enough to support real stayer without losing qualities that made it worth building in the first place. In order to do that though, we might need to start re-examining how we define big topics
Starting point is 00:04:22 like decentralization, permissionlessness and trust, especially in light of Arbitram's clawback of $71 million in crypto stolen in the Kelpdow attack. I recently caught up with crypto analytics and forensic specialist Nick Bucks to discuss all this and more, and here's what we spoke about. Step into a new era of digital wealth with NXO, the Premier Digital Assets Wealth Platform. Earn interest on your digital assets, borrow against them without selling, trade a wide range of cryptocurrencies, all in one place. Nexo is now available again in the US with an evolved product suite tailored to today's
Starting point is 00:04:54 market. For a limited time, new US clients can unlock 30 days of exclusive Wealth Club Premier benefits, including enhanced interest rates, reduce borrowing costs, and up to 0.5% crypto cashback on trades. Get started today at nexo.com slash breakdown. As always, investments in blockchain technology involve risk. Terms and conditions apply. Do your own research. This week I have crypto investigator Nick Bax with us today. Thank you for joining us, man. Thanks for having me on. Great, great to talk to you, David. Cool. So yeah, to give the audience a little bit of background on what you've been up to at least, at least this week, I can understand that you're close to the
Starting point is 00:05:30 metal in terms of this, the arbitrium situation with the, with the kelp down attack. Maybe you just give a, give a brief rundown of, you know, what, what you're really doing day to day in, in the crypto space. Yeah. So I'm a blockchain investigator. I do everything from, you know, developing analytics methods. That's how I really got into it to the fun part is applying them. So we, you know, I look at every type of crypto crime, everything from wrench attacks, which have been going, up a lot in the past year or so to pig butchering, to, of course, I don't know, somewhere between 10 and 25% of everything we look at is North Koreans. So look at everything. Some of it I do, you know, in my private practice, a lot of it I do at seal 9-1-1 as an incident responder. Yeah,
Starting point is 00:06:22 just do what has to be done. I have some questions about about all this, about like the split between like individual attacks and these attacks on protocols a little bit later. But, you know, and I'm sure that you, a lot of the stuff that happened with C-1-9-1 and the Arbitrum situation is confidential. But I'm wondering if you could like give a rundown of what that looked like as it was happening. Was it something that Arbitum reached out to you or was Cil-9-1 proactive about the situation? Well, yeah, I can't really talk about who did what?
Starting point is 00:06:58 but who talked to who. But, you know, the way CLE 911 works is someone reaches out to us. They say, help, all my money's gone. And then we say, can you tell us more? And sometimes, you know, they got fish for $1,500 or sometimes $200 something million got stolen from a smart contract. And then we do triage. So then triage, you know, it's like it's the same as an EMT coming to an emergency.
Starting point is 00:07:27 see, it's like, you know, stop the bleeding, which the kelpdout team did a great job at. They actually did manage to freeze some funds when the North Greens were trying to steal more, right? And then it's, you know, okay, we've stopped the bleeding. What can we do to fix this? You know, you need to know who did it. You need to understand exactly what happened where the money's at right now, and is there anything we can do to fix this. and this is every single incident that we respond to, either at C.L.911 or in, you know, non-Seal incidents.
Starting point is 00:08:06 Yeah, and CLE 911, man, it is, the team is full of the best people I've ever worked with. I've worked at studied and worked at some prestigious institutions, and they were always talking about imposter syndrome, but I never felt it until I got to CLE 911. on. It's just we have subject matter experts for everything that could possibly have to do with crypto. So, you know, people do their part. We figure out what the best parts are. And yeah, you know, things, things get done. Yeah. How big is the team? It's about 30 people. Yeah. Yeah, yeah, nice one. And yeah, I'm wondering like, you know, because I mean, I understand like every protocol is different and then, you know, I mean, every chain is different, every protocol is different and like every app is also different. Like I'm just wondering, like, is there any element to this of
Starting point is 00:09:01 like before incidents happened that you would kind of investigate how the protocols are actually structured? And then so you, you kind of have an understanding of what tools are available to, you know, protocol insiders or like DAWS and stuff like that to actually mitigate some of these situations or is it really like when a when an incident happens that's when that kind of information gets pieced together uh yeah you know i i have i have a significant amount of money in defy i i kind of know what levers the various teams have yeah i i do a lot of due diligence before i park i don't have that much money but i would be very upset if it got rugged so i i do a lot of due diligence in what i parked my money in now that being said i could not i did not foresee the
Starting point is 00:09:47 the contagion that could happen because of like an issue with one project, you know, like it cascaded. It really was contagion that nobody, you know, hindsight is 2020, but I didn't foresee it. I don't really know a lot of people who did. But yeah, yeah, we're crypto users first. And almost all of us got into this because, you know, we got rugged ourselves. and nobody else is going to fix it. So you have to, right? Yeah, yeah.
Starting point is 00:10:21 And I suppose it's a good time to ask, like, because I'm just wondering, like, if security in crypto is getting better or worse. And I think it's like a function of where the attack is. Like, I know, like, the North Koreans are their own kind of cohort and their own army effectively. And then it's up to like the individual attackers are like what they're targeting. But it's like, for the longest time, it was. like sim swaps were a big deal and so like individual investors were getting
Starting point is 00:10:49 targeted a lot and then yeah you've brought up wrench attacks and there's a lot happening in France and across other parts of like northern Europe too but you know it just seems that like how much if that is still happening compared
Starting point is 00:11:05 to the size of the of the protocols that are being attacked because it just seems like that the defy in particular there is a big wave of attention from from hackers targeting like teams specifically, so like social engineering and stuff like that. Like is the sim swap era over or is it really just, is it really just a mess of everything? Yeah.
Starting point is 00:11:27 We sim swaps lasted for years, right? They started up 2015. I got sim swap in 2017. They were still happening frequently until the end of 2019. And then finally the telcos made some improvement. It's pretty rare these days. You occasionally hear about sim swaps. Yeah.
Starting point is 00:11:51 But somehow that problem solved itself. And I don't know the exact answer for why that went away. I think a lot of companies stopped using SMS2 factor. It took way longer than it should have. So, you know, the industry does respond to security issues, and it's gotten a lot better. You know, sim swapping lasted for years. And a lot of other problems, you know, got fixed pretty fast. So ClickFix was a big issue on Macs where, you know, people were,
Starting point is 00:12:21 attackers were telling people to copy and pay something into their terminal. And of course, it wrecks you. So now the new Mac OS actually warns you and prevents you from doing that, which is fantastic. Right. And it happened a lot faster than sim swapping was fixed. So they're, you know, but attackers are innovative and they know it works. And especially the North Koreans are really good at getting remote access to your computer. computer and crypto projects haven't been doing a fantastic job at defending against that.
Starting point is 00:12:50 There's all of these centralized issues, right? You know, two of five, three of five multi-sigs. And let's say, you know, they have a 20% or a, yeah, 20% success rate of getting someone to download a payload and getting remote access to their computer. And you have, you know, five targets. You're going to get one of them. And then you just have to figure out, you know, keep, keep putting shots on goals and attacker eventually you'll get that two or five multi-sig that you need and that's it's scary it
Starting point is 00:13:21 happens a lot. I view of mind that a lot of this is avoidable because I mean I guess it like comes from yeah the structure of the multi-sig's okay but then it is also like it still comes down to the individual person so it's like I mean is that like an org issue like it's it's it's very hard to see how it isn't solvable and it's more of like a culture problem like I wonder how you see it. Yeah, there's a lot of things that projects can do to at least make it harder for the attackers, right? So Seal puts out all sorts of multi-signature frameworks that give a list of best practices. One of the really good ones is EDR. It's like endpoint detection on computers that, you know, control important things. And even then, all of the EDRs aren't equivalent. Some are better than others. So there's little things that certainly help. And every time we see an attack, we figure out what would have prevented this. And sometimes we update the framework to include those.
Starting point is 00:14:26 But security is hard, man. And there's a very big incentive and a lot of money being spent by the attackers invested into these attacks. I'm just curious, like this is a little bit of a tangent. Like it's only because everyone always talks about AI and like is cybersecurity and AI. and like is how do you view that like you using that as a tool like is it is it actually or is it like an attack vector like i'm just curious it's both and i think in the long run it's going to help the defenders more than it's going to help the attackers but right now it's helping the attackers a lot it can automate a lot of stuff that you couldn't use before on the flip side it it does help
Starting point is 00:15:07 you know if you see an issue and it helps analyze it it helps write the code or figure out how to fix the issue very quickly. So everything just happens faster. And that's, that's scary when you're an incident responder and you have to stop the attacker, but it's also really helpful. So I know, I hope that the AI stuff plateaus soon. And then we can just focus on using it to make systems stronger and more robust, right? But right now, the attackers, you know, they just move faster. We're reacting to them. Let's take a moment to talk about NXO. NXO delivers a premier digital assets wealth platform designed to help clients build, manage and preserve their wealth, earn interest on your digital assets, access crypto-backed credit without selling your holdings, trade with advanced tools, all supported
Starting point is 00:15:51 by 24-7 client care. Now back in the US, NXO offers new clients 30 days of exclusive World Club Premier Access, that means enhanced interest rates, reduce borrowing costs, and up to 0.5% crypto cashback on trades. Benefits typically reserve for wealth club members and private clients. Nexo is also expanding its global presence, becoming the official crypto partner of Tennis Australia, the organization behind the Australian Open and the digital asset partner of the Audi Revolut Formula One team. If you're ready to approach digital assets
Starting point is 00:16:18 with a more structured wealth strategy, visit nexo.com slash breakdown to get started. As always, investments in blockchain technology involve risk, terms and conditions apply. Do your own research. Yeah, and is that like, you would kind of push people more towards using like their own offline models
Starting point is 00:16:35 rather than kind of like the always online ones? like it those those AI data breaches scare the crap out of me right there was one at lovable earlier this week that was really really bad right and now they're saying it wasn't a data breach which is insane but yeah like if if you know if anthropics data leak that would be really bad everybody's uploading keys to their AI all the time it's it's like hard to prevent so yeah I think in the long run, AI privacy has a long way to go. Yeah, for sure.
Starting point is 00:17:13 Cool. And maybe just bear with me with this, with this kind of next thing I'm wondering about because it's like this, it's like you're damned if you do and you're damned if you don't with, with crypto and the blockchain space in general, because like, okay,
Starting point is 00:17:27 we have very decentralized protocols. You know, you can't just go and hack Ethereum. Like, that's very obvious. So, and also, though a lot of layer ones aren't, super efficient. So you have to go and use more centralized protocols, you know, layer twos and stuff like that in order to do the the most interesting stuff like trading and stuff like that. So, you know, but you end up having this situation where you do have protocols that have some element of
Starting point is 00:17:58 centralization to them. And that is exactly what makes it attractive to attackers. But at the same time teams and protocols don't really want to admit that they do have these tools available to them because that would admit that they are somewhat centralized. And then that also brings some amount of liability of investor protection, user protection, if they do have those controls. So like I somehow feel like we're just kind of stuck at this point where it's like it can't be solved. Like it does take industry-wide culture of really admitting that we do have these tools available to us to defend in these situations, but nobody wants to admit that they do have these tools.
Starting point is 00:18:46 I was just wondering, like, do you, how do you think about all of that? That's, that is a hot topic this month, huh? Yeah. Okay, so everybody always wants to think or believe that blockchains are immutable, but the reality, even, even Bitcoin has always relied on social consensus. Right. And I think it's great that Arbitrum is the center of attention right now because I think they're actually one of the protocols that's really doing it right. Take a step back. Look at how Monaro handles it, for example. So Monero is one of the most decentralized cryptocurrencies. They're,
Starting point is 00:19:24 you know, they're like very crypto-anarchist libertarian types. Right. And back in 2017, they actually found a crypto note inflation bug. And it allowed an attacker to create essentially infinite amount of Monero. And they had to keep it secret for months. They had to somehow sneak the code into a hard fork. And if even a single person leaked it, it would have destroyed their entire network and every other network that used the crypto note code. So, you know, they managed to pull it off, which is amazing.
Starting point is 00:20:00 And then, you know, now you've got arbitram. They've got a 9 of 12 multi-sig. Every society has had people that we delegated secrets to. We, like, trust them. You know, like, I don't expect the FBI to be completely transparent about their ongoing investigations. And I sort of see that 9 of 12 multisig the same way, right? It's 12 very transparently elected people or companies that we trust.
Starting point is 00:20:25 They're staking their reputations to not screw us around. And they do have. handle these really sensitive secrets because there are things that, you know, there are vulnerabilities that could destroy a network or cause, you know, some major issues to the integrity and loss of funds. So you do need to have these people at least right now. And even going forward, I don't really know how you can ever fix that, right? Because we're talking about edge cases, things that nobody could have predicted. So I do think, you know, having nine or 12 people that you trust to secretly handle these issues is the right way to do it, at least for now.
Starting point is 00:21:05 Now, on the other hand, you have a two of five multi-sig that can only, it's only supposed to be able to change parameters, but it turns out if you change those parameters in just the right way, you can steal all the money from a protocol, that's really problematic. And that's something that has to, auditors have to really shine a light at that. The other problem is like those two of five signers, they're like in the same building. they're sending each other emails in code all the time. If you hack one, you can pretend to be him and send code to the other and he'll run it and then you've hacked two, right?
Starting point is 00:21:38 So, yeah, decentralization is a spectrum and we really have to push towards, you know, at least the arbitram level. I have a lot of money in arbitram. I'm not worried at all about nine of 12 with those signers getting hacked and rugging my funds, right? But that's not the same for all. other protocols. Yeah, it's so difficult, Chris, you know, I, I mean, there's just so much shit posting,
Starting point is 00:22:04 you know, and it's like people, people see the arbitrum stuff and then they make jokes about defy and decentralized finance and stuff. And, you know, and then my knee-jerk reaction to that is that it's like, I mean, by this might be a little bit silly, but by default, defy is decentralized just because there are so many protocols. Like, there is such a wide array of different things going on. you know, from all parts of the world. So as a whole, it is decentralized finance.
Starting point is 00:22:32 But there is still thresholds that apps and protocols operating within that space do need to meet in order to really have that title. You know, and I mean, do you see it getting better? Like, it's just so painful that it's like we have to have these big giant incidents for it to make sense. And like drift was a very different thing because that was like a long-term social engineering thing. you know, at the business level.
Starting point is 00:23:02 You know, and it's like, do you see it getting better? Because it just feels like a lot of these things are like recipes for copycats and and all of that kind of thing. I hope it gets better. I think all we can do is shine a light at the, you know, practices that aren't the best. And, you know, the market is putting a lot of pressure on people now, especially, you know, you're not going to park a million bucks in a protocol. if you know that two of their developers get hacked and then you lose all your money.
Starting point is 00:23:33 Right. And I think people are finally starting to take those risks into account. That's really what it takes. And it's scary. Like I mean, I know you work closely with Tay and then I read some of Tay's posts. And it's like it all may like, like some of the things that she says it's almost like there are like sleeper cells in
Starting point is 00:23:52 Defi that have worked at all these protocols. Like maybe the maybe these are protocols left over from Defy Summer. like a few years ago or something like that. You know, and it's like, does it take like a proactive screening of protocols that do exist now and like and what they're doing? Like that seems like the next logical step that you would kind of root out projects
Starting point is 00:24:15 that do seem quite sketchy or at least there's question marks over what their provenance is as an organization, I guess. Is that part of what Seale is doing? Like it's a very responder like, a responsive unit, I guess. But I guess there's room to go out and really kind of proactively analyze what the protocols are. Yeah, and we do a lot of that.
Starting point is 00:24:40 So there's a group of people that I'm a part of that specifically tries to root out DPRK IT workers. Tanuki 42 is really big on that. And then there's guy Black Big Swan who's also heading up those efforts. that's it's it's very fun um we there there are IT workers that have been working in defy since defy summer and uh pretty good devs every time we find a company and we ask them about them we're like hey uh do you know these guys are like they're pretty good devs and then you like sort of show them the red flags for dpr k i tprkit workers and they're like oh shit uh it's it's pretty unusual that a company will be like no i try
Starting point is 00:25:25 trust that guy. As soon as you tell them, you're like, oh, yeah. What are some of those red flags? Okay. So, and they've changed because the IT workers have gotten better over time. But, uh, you, you know, sometimes they like push code from different GitHub accounts, which doesn't make any sense. Like, everybody has one GitHub account. So you got a guy using two or three different GitHub accounts and constantly getting, you know, new email addresses. Like, that's kind of weird. And then you ask them about where they live. You know, you're like, oh, you're in Houston? What's a good restaurant in Houston?
Starting point is 00:26:01 And they say, oh, there are no good restaurants here. It's like, come on, man. And like you try and meet them in person. And of course, they'll never show up. They'll always make an excuse if you invite them to a company offsite or whatever. Now, that being said, they've started using facilitators. So it could be anybody in any country. There's people who will go to meetings and pretend to be someone else.
Starting point is 00:26:29 So like you're literally talking to or they may rent your identity. We've spoken to these facilitators who rented their social security number and sent copies of their birth certificate to North Koreans. So the North Koreans could work for them. They rent out their freelancer or their Fiverr accounts. It's getting harder. And that's the really scary thing that came up and drift is like, they had real people with real resumes that worked at real tech companies who were, you know,
Starting point is 00:26:58 claiming to be biz dev or engineering at a company and, you know, got the developers to download malware. And that's terrifying. And like, it's really hard to defend against. These are people they met in person. So that's,
Starting point is 00:27:14 there's no social defense against that. Like, these are developers that I would have hired, right? they had good resumes. So that's where you really have to do the security. You have to assume that, you know, two multi-sig signers can get compromised. Yeah, it just seems like the obvious thing is that every, at least every VC-funded company operating in crypto needs some kind of, I mean, maybe they already do.
Starting point is 00:27:44 And maybe you have some insight there, like a dedicated team within the org that is purely hunting this stuff constantly. you have a few people on the payroll that that's just their whole thing you know do you see any of that happening like maybe it happens at crypto exchanges and and that that happened because so many exchanges were being hacked in the past half decade but are you seeing that trend at all so yeah we've gotten a lot better especially about information sharing between companies so yeah any any company with you know five engineers will have one guy who's well versed in security but they may not be you know it may be a guy who is a developer and he does security on the side.
Starting point is 00:28:25 And, you know, he follows crypto Twitter, so he kind of knows the threats, but he may not know the exact details. So that's one of the things that Seal 9-1-1 really helps bridge the gap. And that's also, there's the Dow Security Fund is trying to, you know, it's more efficient to have, being centralized is more efficient sometimes, right? So we're kind of, and having, you know, you don't necessarily need a dedicated security person at every company. you might want, you know, a network of people who can share Intel.
Starting point is 00:28:55 And that's one of the things that's unique to crypto is because all the DeFi companies all kind of interact with each other, either, you know, like on chain or actually in person with agreements. So they're all kind of one big company in a way. So you do need some joint security. So I think information sharing about like the emerging threats is really, really important for that. I'm wondering like you're like the difference between your advice. for like individuals who who might just have a bunch of money caught up in Ave or something like that like compared to to protocols like is it the same same advice really like it depends i mean
Starting point is 00:29:34 how rich you are right if if you're below a million dollars i think a hardware wallet is probably pretty good um if you're a bigger target you need to you know there there are services for high net worth individuals that help them improve their OPSEC, you really do need to think about all the different things that could arise. Security is hard. I mean, it's, you know, the idea that I have like 12 words hidden in a safe deposit box somewhere that control most of my net worth is, is terrifying, right? And I know what I'm doing. I know, like, most people don't. It's really, it's really scary. And those are things that I think the industry is starting to fix, especially for individuals. makes a lot of sense
Starting point is 00:30:21 and we're only of time for maybe a couple more but I wonder your take on Thorchain because I mean I think just the concept of developing mixes in particular is like it feels kind of over because of everything that happened with tornadoescation. I know tornadoes still functions
Starting point is 00:30:41 but it just seems like at least the DPRK is like focusing on laundering their funds through Thorchain and then when I read the discourse about Thorchain, it's like, well, you know, its brand is that it's really decentralized. And they are really avoiding involvement at all in stopping a lot of this stuff. Like, is it as decentralized as they're claiming?
Starting point is 00:31:06 Like, can they actually do something? Or is it just, you know, it's a function of the crypto space that if it's not going to be Thorchain, it's going to be another one, you know? So, you know, I wonder and how you're feeling about it. That's a tough question. So up until I think February 2025, they did have admin keys that could basically have shut down Thorchain and it was centralized. And they actually did use those admin keys to shut off the lending and I think maybe also
Starting point is 00:31:35 the trading. I think they did remove those admin keys a little over a year ago. So then the next question is, I believe they're run by 100 nodes. Now, how many of those node operators are unique? That's a tough question, right? I don't have a very solid answer for that. I can tell you it's not 100 separate individuals, right? There's definitely some people running more than one node or very closely associated people running nodes.
Starting point is 00:32:07 It's more of like an ethical issue, right? Like what value are you creating if your biggest user by a lot is North Korea, right? right? Like, yeah, you're making lots of money and you bought a helicopter. Good, good for you. But like, you're still a piece of shit, you know. I'll just say it. It's not, they're not creating value for most users. And could they stop it? I think there's, you know, they know their system better than I do. They could have stopped it when they had the admin key. They probably could still figure out how to at least add a lot of friction for DPRK, but they don't want to. Yeah.
Starting point is 00:32:52 Yeah, there is always a way. Like it's, you know, I mean, a decentralized protocol is great, but there's, there's so many layers, you know, that you can work through to actually kind of like, yeah, make life more difficult. And it's just so difficult because it's like, there'll always be something else as well. So it does take a proactive approach to stuff that's happening. And I suppose that that does just make everything more interesting because there is always something to respond to, which I guess is, you know, it's good if you're in the, if you're in
Starting point is 00:33:24 the investigation business, I guess. Do you, do you feel like that, that it is just a constant, like, whack-a-mole game or it's like, we are heading to some kind of equilibrium where it's like these are the tools that exist and we just kind of need to operate within the space that has been built? Yeah, I hope that we hit an equilibrium where all, Only the secure protocols are left. Yeah. But no, it is wackamble. And I hate being reactive and it's getting harder to react, right?
Starting point is 00:34:00 You know, $71 million was a very big win. And we don't get a lot of those. Sure. Now, now that being said, now that that cat is out of the bag, I don't think DPRK is going to go and raid Arbitrum for liquidity anymore. right and that's actually going to protect them in the long run they're just not going to risk it so they do stay away from from protocols that fight back the Nia is another one that like they don't really go there and you know I think I think Tay may have scared them off there's there's a few
Starting point is 00:34:38 other services that they don't use anymore because they've gotten burned so the question is what can we do and there's always something and yeah i point it circle that they're really easy to point at because they're deliberately not doing anything yeah it's really tough and i think it also just goes back to like decentralization is a brand and it's like you you can you can adopt that brand even even though the the reality of the matter is that you don't really have a claim on that brand also and it's like this kind of standoff between wanting to admit that you that you that you do use these these tools available to you to freeze and i mean even even clawback it's it's it's very different and it's like that it's such like a flimsy thing to have to battle against
Starting point is 00:35:27 this this concept of decentralization as a brand it's just it's super frustrating but and so i mean i think we might end on like it your advice for like people wanting to break into the on-chain investigation game because if anything, the space needs more on-chain investigators who really know their stuff and know the tools available and all of that. It's like, is it possible to break into this without having a lot of funding yourself to like go and pay for chain analysis or something like that? Like how, if you were like a 16-year-old kid wanting to do this, like how would you get into it? Yeah, I mean, Zach didn't have TRM for the first few years, right? Archim Intel is a very effective tool.
Starting point is 00:36:15 Tay uses Arkham all the time. I, you know, like you said, chain Alice is expensive. But the way, there's two things you can do to get started. One is follow every other investigation that you see on Twitter and just try and repeat the steps and see, you know, just master the skills. And then the other is just start helping random people. And that's hard. And you have to be careful. you don't want to give people bad advice, but there is no shortage of cases to look at.
Starting point is 00:36:45 That's how I got my start, right? I was just helping random people who, you know, the police weren't going to help them because they didn't know. So that's, there's no shortage of people to help. And as long as you're careful about it, you know, I think about 10% of cases are solvable or actionable. So just do it because you can. Cool, man. Cool. Well, I think we might leave it there.
Starting point is 00:37:09 Thanks so much for joining us today, Nick. And I hope to have you back on the breakdown soon. Hopefully, after not a catastrophic incident for this space, but just back on under better circumstances. Yeah, thanks for having me, David. See it. That's about all the time we have for today. Let me know how you're feeling about Defi
Starting point is 00:37:26 and the North Korean hacking spree in the comments. And we'll see you next time.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.