If you are a Hacker, and you know about such a shocking huge vulnerability:
You know that there are many methods for on-chain information forensics now. The RPC you use to initiate transactions can also expose your IP (unless you have a private node). After washing, it's still very difficult to enter an exchange because associated addresses for deposits and withdrawals will be banned. Only a small part of the money can be washed out quickly. Especially if you are not a North Korean Hacker and do not have government physical protection, sooner or later you will be caught and have to cough up the money to buy back your freedom.
In this case, can you use some addresses to hold empty ETH/large-cap, and then use another address to expose the vulnerability, leaving the hacked money without washing it, waiting for two days while other addresses have closed their positions, and then negotiate with the project party to return the money to wash it as a white hat hacker.
The money has been made, and it has been laundered into a white hat, so there will be no further accountability.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
If you are a Hacker, and you know about such a shocking huge vulnerability:
You know that there are many methods for on-chain information forensics now. The RPC you use to initiate transactions can also expose your IP (unless you have a private node). After washing, it's still very difficult to enter an exchange because associated addresses for deposits and withdrawals will be banned. Only a small part of the money can be washed out quickly. Especially if you are not a North Korean Hacker and do not have government physical protection, sooner or later you will be caught and have to cough up the money to buy back your freedom.
In this case, can you use some addresses to hold empty ETH/large-cap, and then use another address to expose the vulnerability, leaving the hacked money without washing it, waiting for two days while other addresses have closed their positions, and then negotiate with the project party to return the money to wash it as a white hat hacker.
The money has been made, and it has been laundered into a white hat, so there will be no further accountability.
Is this plan feasible?