Ether Thief Remains Mystery Year After $55 Million Digital Heist 2017-06-13 08:00:18.224 GMT
By Matthew Leising (Bloomberg Markets) -- Summer colds are the worst, and Emin Gün Sirer had caught a wicked bug from his 1-year-old son. So it was with watering eyes and a stuffy nose that the associate professor of computer science at Cornell found himself working from his sickbed on Monday, June 13, 2016. Gün—everyone calls him Gün—couldn’t tear himself away from his laptop. He had another type of bug in his sights, a flaw in a line of computer code he feared put $250 million at risk of being stolen. It wasn’t just any code. It was the guts of the newest breakthrough in software design related to blockchain, the novel combination of decentralized computing and cryptography that gave life to the virtual currency bitcoin in 2009. Since then, the promise of blockchain to transform industries from finance to health care has captured imaginations in corporate boardrooms and governments alike. Yet what the Turkish-born professor was exploring that Monday was the next leap forward from bitcoin, what’s known as the ethereum blockchain. Rather than moving bitcoin from one user to another, the ethereum blockchain hosts fully functioning computer programs called smart contracts—essentially agreements that enforce themselves by means of code rather than courts. That means they can automate the life cycle of bond payments, say, or ensure that pharmaceutical companies can authenticate the sources of their drugs. Yet smart contracts are also new and mostly untested. Like all software, they are only as reliable as their coding—and Gün was pretty sure he’d found a big problem. In an email sent to one of his graduate students, Philip Daian, at 7:30 p.m., Gün noted that the smart contract he was looking at might have a problem—on line 666. (They say the devil is in the details.) Gün feared the bug could allow a hacker to make unlimited ATM-like withdrawals from the millions, even if the attacker, who’d have needed to be an investor, had only $10 in his account. This staggering amount of money lived inside a program called a decentralized autonomous organization, or DAO. Dreamed up less than a year earlier and governed by a smart contract, the DAO was intended to democratize how ethereum projects are funded. Thousands of dreamers and schemers and developers who populate the cutting edge of computer science, most of them young, had invested in the DAO. This was real money, a quarter of a billion dollars, their money, meant to build a better version of the world, and every cent was at risk. Gün, who wears his dark hair short and looks a decade younger than his 45 years, had already been tracking and publicizing flaws in the DAO’s design. A few weeks earlier, on May 27, along with two colleagues, he’d urged investors to stop buying into the DAO until security issues could be fixed. It had been too late, however, and the program went live the next day. Smart contracts such as the DAO are built to be entirely reliant on their code once released on the ethereum blockchain. That meant the DAO code couldn’t be fixed. Other blockchain experts—including Peter Vessenes, co-founder of the Bitcoin Foundation—had also pointed out security flaws in the smart contract, but Gün appears to be the first to pinpoint the flaw that put the money in jeopardy. The problem was the code was so new that no one knew what to expect—or even if there was actually a problem in the first place. Gün had his doubts, too. This wasn’t even his job. He does this for fun. Daian didn’t think they’d found anything either. Over email, he said, “We might be up the creek ;).” Later, when Gün pointed to the error in line 666, Daian replied, “Don’t think so.” Gün says, “We don’t sound the alarm bell every time we find a bug that seems suspicious.” Instead, he went to bed to try to kill his cold—the one bug he knew to be real. “I was too miserable to sort it out,” he says. Four days later, Christoph Jentzsch lay on the floor of his home office, taking deep breaths, trying not to panic. It was Friday morning, and software developers all over the Western world were waking up to the news that the DAO, which Jentzsch had created, was being attacked. Gün had been right. Jentzsch, who has dark hair and a perpetual five o’clock shadow, lives with his family in the Mittweida region of Germany, a rural spot not far from the Czech border. Mornings in the Jentzsch household are a whirlwind as he and his wife get their five children—age 2 to 9—fed and off to school. Yet today, after his brother Simon woke him with a call that the DAO was being hacked, Jentzsch had to ignore his familial duties. “You’ve got the kids,” he told his wife. “I have an emergency.”
This is the story of one of the largest digital heists in history. And while you may have heard last year that hackers breached Swift, the bank-to-bank messaging system, and stole $81 million from Bangladesh’s central bank, the DAO attack is in a different category altogether. It played out in front of anyone who cared to watch and couldn’t be stopped. Just as the global WannaCry ransomware attack in May laid bare weaknesses in computer operating systems, the DAO hack exposed the early frailties of smart-contract security and left many in the community shaken because they hadn’t found the bug in time. The aftermath would eventually pit good hackers against bad ones—the white hats vs. the black hats—in the strange and futuristic- sounding DAO Wars. The roots of the DAO belong to an idea Jentzsch borrowed from another internet-fueled phenomenon: crowdfunding. The 32- year-old Jentzsch, a theoretical physicist by training, and a few colleagues started Slock.it in 2015. As they considered how to fund the company, Jentzsch approached it as many had—sell a digital currency, effectively a token, to raise cash. But why should each new startup have to program its own initial coin offering? Jentzsch wondered. What if one huge fund ruled them all? He introduced his idea to the world at DevCon 1 in London in November 2015. “What is the blockchain way of creating a company?” Jentzsch asked his audience. “Of course, it has to be a DAO.” It would work like this: Ether, a virtual currency like bitcoin, would be used to fund and develop applications on the ethereum blockchain—things such as making a music app similar to iTunes or a ride-sharing service along the lines of Uber. Investors would buy DAO tokens with their ether; the tokens would allow them to vote to fund projects they liked. If the app they backed made money, the token holder shared in the profit. In the six months he spent creating the DAO, Jentzsch thought it would raise $5 million. From April 30 to May 28, the DAO crowdfunding pulled in $150 million. That’s when ether traded just below $12. As the price of ether rose in the following weeks to $20.75 the day before the attack, so too did the value of the DAO, putting a $250 million target on this thing Jentzsch had unknowingly brought into the world with a fatal, original sin. “Our hope was it would be the center of a decentralized sharing economy,” says Jentzsch, who now regrets not capping the amount raised. “For such a big experiment, it was way too early.” In the weeks after the attack, Jentzsch and the rest of the ethereum community would come to grips with their own crisis that, writ small, echoed the bank bailouts and government rescues of 2008. “It became too big to fail,” he says. But why would anyone invest in the DAO in the first place? It has something to do with the strain of digital libertarianism at the heart of the ethereum community, much like the set of beliefs that led to the birth of bitcoin. Think of bitcoin as the first global currency whose use can’t be stopped by governments or corporations; on top of that, bitcoin is almost impossible to hack. Ethereum, then, is another level beyond. It’s an uncensorable global computer. As amazing and unprecedented as that is, it’s also a bit terrifying. Brought to life, the DAO ended up staggering off the table and turning on the community that wanted it so badly. Accustomed to working into the night to stay in touch with colleagues in North America, Jentzsch blows off steam by jogging or kayaking on the nearby Zschopau River. Yet on that Friday morning, he had the more pressing task of pulling himself up off the floor and dealing with the attack. “I went into emergency mode: Don’t try to save the DAO,” he says. “No, it’s over.”
It was far from over. Several hours later and half a world away from the Jentzsch household in Mittweida, Alex Van de Sande was waking up in his apartment in the Copacabana neighborhood of Rio de Janeiro. The baby-faced ethereum developer had been born in the small fishing village of Santa Cruz Cabrália in the Bahia region of Brazil and moved with his parents to Rio when he was about 3 years old. These days he’s known as “avsa” on Reddit and Twitter. After reaching for his phone to see why it was blowing up with Skype messages, he turned to his wife and said, “Remember when I was telling you about that huge unhackable pile of money?” She nodded. “It’s been hacked,” he told her. His first thought was to get his DAO tokens out. He owned about 100,000 of them, valued at about $15,000 at the time. He’s the lead designer of the Ethereum Wallet app, a program that allows him and anyone else to interact with the blockchain. Van de Sande scrambled to log in to it, but his password didn’t work. It was glitching, and as he worked to fix it, his panic subsided. He realized he shouldn’t be bailing on the DAO but trying to save it. And to do that, he needed Griff. Griff Green, who’s worked variously as a massage therapist in Los Angeles and a community organizer in Seattle, is one of only a handful of people in the world who holds a master’s degree in digital currencies. He got it online, natch, from the University of Nicosia. A self-described “dreamer,” the 32-year- old is the closest thing Ethereumville has to a mayor. Green knows everybody; in fact, he’d been the first to relay word of the attack to Simon, Jentzsch’s brother and a co-founder of Slock.it. Green had been working for Slock.it for about six months by then and woke up that morning in the house belonging to Jentzsch’s mom in Mittweida. Jentzsch is one of nine children, so his mother had a spare bedroom where she could put Green up for a few days. Using his extensive contacts, Green started identifying as many people as he could who were interacting with the DAO—going so far as to ask strangers to send pictures or scans of their IDs—in an attempt to sort friend from foe. And then something strange happened: The attack stopped working. In the six hours since the attack began, the thief had managed to steal 30 percent of the DAO’s 12 million ether—which that day equaled about $55 million. “We don’t even understand why the guy had stopped,” says Van de Sande. Now Green raced to protect the remaining 70 percent of the DAO the attacker hadn’t stolen. Once Van de Sande got in touch with Green in Germany, along with two or three others, the foundation was laid for what would become known as the Robin Hood group—white hat hackers who’d devise a bold good-guy plan to drain the remaining DAO. To save the DAO, they’d have to steal the remaining ether, then give it back to its rightful owners. And yet as they scrambled that Friday, qualms emerged within the group. “What does it even mean to hack something?” Van de Sande asks. No one knew if what they were about to do was legal. Also, wouldn’t their hack look just as bad as the theft they were trying to stop? Then there were the practical issues. “Who pushes the button?” he remembers wondering. Doing so would initiate their counterattack and alert the community. “Someone has to push the button.” The price of ether the night before the attack had hit an all-time high of just above $20. News of the hack sent it tumbling to $15 by the end of Friday, wiping out almost a half- billion dollars in market value. At that price, the DAO still held $125 million, and the Robin Hood group worried the attack would resume. They might be the only line of defense if it did, so Van de Sande agreed to use his DAO tokens to fuel their counterattack, thereby becoming a public face of the group. At this point, it might help to think of the DAO as the spacecraft in Alien after Ripley initiates the self-destruct sequence. To flee, she’s forced to use an escape pod. DAO investors had to initiate a similar sequence to deploy escape pods that would allow them to get their ether out of the DAO. The code that dictated the escape pods’ behavior is where the bug lived, so to steal the remaining DAO funds the Robin Hood group would have to be in a pod to exploit the flaw—and because of the way Jentzsch wrote the DAO, they had only a short window of time and just a few pods to choose from. A few minutes before launching the attack, Van de Sande joked on the group’s Skype chat, “Let’s go rob a bank!” No one laughed. “Not everyone really appreciated the humor,” he says. In his Copacabana apartment, Van de Sande readied to push the button on his laptop. Then, suddenly, he lost his internet connection. His router was down. “I was like, What the f--- is going on here?” he says. He had less than 30 minutes left to execute the Robin Hood hack. He frantically called NET, his Brazilian internet service provider, but couldn’t get past the automated customer service experience. He says the robotic voice told him, “We see there’s an internet issue in your neighborhood.” The irony was not lost on him: Here he was trying to steal millions of dollars from a robot but was being waylaid by another robot. “Then we missed,” he says. The window closed. He went from the high of feeling like they were about to come to the rescue of the vulnerable DAO to the crushing low of having their international connection severed by NET’s breakdown. He took his dog, Sapic—named after the one in Pedro Almodóvar’s All About My Mother—for a walk, then crawled into bed, defeated. The next morning was Saturday, and Van de Sande tried to reconvene the Robin Hood group to infiltrate another escape pod. But folks were busy and couldn’t get together. “We felt like the worst hackers in history,” Van de Sande says. “We were foiled by bad internet and family commitments.”
Who, exactly, were they at war with? No one really knows, but there are some clues. One address the attacker used is 0xF35e2cC8E6523d683eD44870f5B7c C785051a77D. Got that? Like everything else in a blockchain, a user’s address is an anonymous string of characters. But every address leaves behind a history on the blockchain that’s open for examination. Not that it makes sense to 99.9 percent of humankind, but Green gets it. To pull off his heist, the attacker needed to create a contract that would interact with the DAO. He did so on June 15 and deployed it in the early morning hours two days later, according to Green. Once activated, the attack contract started sending about $4,000 worth of ether through the attacker’s account every three or four minutes to drain the DAO. But where did the original money to fund the attack come from? To interact with the ethereum blockchain, every contract must be funded by an amount of ether. This attack contract was funded by two addresses, but tracing it further back becomes tricky. That’s because the second address used an exchange called ShapeShift to send 52 ether into its account on June 14. ShapeShift doesn’t collect any information on its users and says it turns one virtual currency, such as bitcoin, into another, like ether, in less than 10 seconds. While there are valid reasons for using ShapeShift, it’s also a great way to launder digital assets and cover your tracks. After the attack contract stopped working, the thief needed to deploy it again, says Green. He tried but failed, and after a few more transactions, the hack whimpered to an end. (One possible reason the attack stopped, Green says, is that the hacker’s tokens became corrupted, which means he had no way to exploit the bug.) We know this limited amount of one-sided information from the blockchain’s public record. Digital asset exchanges see both sides. An internal investigation by one such exchange concluded that the DAO attacker was likely part of a group, not a lone wolf, based in Switzerland, according to an executive there who wouldn’t speak on the record or allow the company’s name to be used. Exchanges are in the unique position of being able to analyze the trading activity of their customers because they know who they are, even if they’re anonymous on the blockchain. The executive says the exchange shared the analysis with the Boston office of the FBI, though there’s been no further contact since October of last year. Cornell’s Gün says he also spoke to the Boston office of the FBI—and to agents in the New York office and to the New York State Attorney General’s Office. “It’s very difficult to coordinate an attack of this kind without leaving breadcrumbs behind,” Gün says. He encouraged the FBI to look at the ethereum testnet, where programmers can run their code in a safe environment to work out kinks. The attacker wouldn’t just launch such a complicated hack without testing it, Gün says he told federal officials, and the feds might be able to get clues to his identity there. Gün says he also pointed them to addresses linked to the attacker, such as the one described above, that were listed by his grad student Daian on his blog. (The FBI declined to comment.) “I’m absolutely amazed. Why has no one traced this back and found out who did it?” asks Stephan Tual, the third co-founder of Slock.it. “It still bugs me to this day, because what that person has done is incredibly unethical.”
On Tuesday, four days after the initial attack, the hacker returned and somehow resumed the heist. The Robin Hood group had feared this moment would come and was ready. Early Sunday morning they’d finally managed to convene online and successfully infiltrate an escape pod, but had held off their counterattack. Now they had no choice. One strike against the group was their distance from one another—one in Rio, others scattered about Europe. (Some of the group’s members didn’t want to be identified for this story.) It was important that they coordinate their activities because, like in Charlie’s Angels, they all had different specialties: Green the community organizer, Van de Sande the public face, others who wrote the Robin Hood group attack contracts. So Van de Sande needed to be walked through the step-by-step hacking process they were about to unleash, because that wasn’t his area of expertise. “I’ll be honest, I was excited,” Green says. “This is the craziest thing that’s ever happened to me. This is the craziest thing that’s almost ever happened to anyone.” Whether it was legal remains an unanswered question. “You literally have cyber ninjas warring on the blockchain,” says Vessenes, the programming expert. “What they’re doing is almost certainly illegal, but they’re claiming it’s for the greater good.” And now it was Van de Sande’s job to let the community know that the Robin Hood group counterattack was benign. He took to Twitter, where he wrote “DAO IS BEING SECURELY DRAINED. DO NOT PANIC.” A nod to the classic Hitchhiker’s Guide to the Galaxy, his plea to not panic was met with all the snark and real-life concern Twitter can handle. “NOTHING SAYS DO NOT PANIC LIKE ALL CAPS,” one user responded. “#RealLife is more exciting than
MrRobot !!” tweeted another. Yet as the Robin Hood group attack
gained steam, they noticed something strange and worrisome—the attacker was with them in every escape pod. “We escaped the mother ship, but now we’re alone in space with the alien we were trying to escape,” says Van de Sande. This was a big problem. Because of how Jentzsch wrote his code, the Robin Hood group would have to wait several weeks before they could secure the ether they recovered. Yet if the attacker was in that escape pod with the group, he could just follow them—what’s known as a stalking attack. If the hacker stalked the Robin Hood group, the ether wasn’t really safe after all. “The game only ends when one of these parties doesn’t show up to fight,” Van de Sande says. This, in essence, is the heart of the DAO Wars, the never-ending battle that would have to be waged to keep the recovered ether safe. If only there were a way to reverse the theft once and for all.
What happened next is one of the strangest and most contentious episodes in blockchain’s early history. The morning of July 20 dawned cool and clear in Ithaca, N.Y., the home of Cornell. A weeklong ethereum boot camp on campus had brought developers and programmers from all over the world to town. The mood was anxious, but not because the workshops were about to begin. This was the day the ethereum community would decide to rewrite the past. The weeks since the DAO hack had been filled with acrimonious debate as developers, coders, investors, and other community members considered their options to undo the theft. As the Robin Hood group battled the attacker mostly in private, a public debate was raging. The white hat hackers weren’t the only ones trying to save the DAO. Jentzsch worked almost around the clock, fielding hundreds of requests from DAO investors on what they should do. Vitalik Buterin, 23, who created the ethereum blockchain before he was 20, became a focal point as he led the community through their options. In short, what they could do was change the ethereum blockchain to fix the DAO, but only if they got a majority of computers running the network to agree to a software update. Pull that off, and it’s as though the attack never happened. This is known as a hard fork. The decision stirred such strong reactions that it remains controversial a year later, both within the ethereum community and with bitcoin users who insist a blockchain’s history is never to be tampered with. In an interview in October, Buterin was unapologetic about pushing for the change. “Some bitcoin users see the hard fork as in some ways violating their most fundamental values,” said Buterin, who didn’t respond to requests to speak specifically about this story. “I personally think these fundamental values, pushed to such extremes, are silly.” Within the ethereum community, at least, Buterin’s views won the day, and computer nodes all over the world accepted the fork. Contained in block 1,920,000, the fix to the DAO was simple and did only one thing—if you had ether invested in it, you could now get it out. But why hadn’t the attacker made off with his money? It had been more than a month. The same code that exposed the DAO to the theft, in the end, enabled the ether to be returned. Everything to do with the DAO is a parameter: rules, if-then statements, and more rules that are all finalized before the program is set loose. One of these parameters stated that anyone wanting to get their ether out of the DAO had to wait a certain amount of time—27 days after the initial request, then another seven days. This fail-safe, written by Jentzsch, applied to the attacker as well. So even though somebody had effectively robbed a bank, he then had to wait 34 days before crossing the street to make his getaway. While he was waiting, the money was stolen back. A month after the original heist, the ether thief now had nothing to show for his caper. Back on the Cornell campus, ethereum boot camp attendees celebrated. The next day, Gün brought Champagne to the session he was teaching. He’d pasted makeshift labels on the Chandon bottles with a picture of the utensil that said, “Congratulations on the successful fork.” Then something else unexpected happened. The original ethereum blockchain, the one with the DAO attack in it, kept growing. Imagine a hard fork is a branch of a tree that sprouts in a different direction at the end of the main limb. The end of that limb is supposed to wither after a hard fork, but here it continued to grow as a small group of users continued to process transactions on that version of the blockchain. Instead of dying, this became a second form of ethereum, quickly dubbed ethereum classic, complete with a digital currency that now had value. Even in the science fiction world of blockchain, this was an unprecedented turn of events. It meant the DAO attacker suddenly had about 3.6 million ethereum classic coins in his DAO account, known as the DarkDAO, which were slowly gaining in value. The Robin Hood group held about 8.4 million, because in this parallel universe they still controlled 70 percent of the DAO funds they had recovered. The Robin Hood group couldn’t believe it. “We did everything to avoid this, but now we’re being dragged back into this fight,” Van de Sande says. Now, the bitcoin supporters who viewed the hard fork as a violation of the core values of blockchain could back up their belief by buying ethereum classic. That’s exactly what entrepreneur Barry Silbert, a heavyweight in bitcoin circles, did. “Keep in mind, the original chain is ethereum classic,” he says. “The fork is ethereum.” Putting his money where his mouth is, Silbert’s firm, Grayscale Investments, recently issued an investment thesis outlining the benefits to ethereum classic over ethereum. A section heading sums up the rationale: “The DAO and the Death of Principles.” Alexis Roussel, co-founder of Bity.com, a digital currency broker in Switzerland, still marvels at the aftereffects of the hard fork and the wild world of the blockchain. “This is something that doesn’t happen in traditional finance,” he says. “If something happens with Apple, you don’t suddenly have a clone of Apple.”
It’s been about a year since the DAO attack, enough time to take stock of what went wrong. Van de Sande is eager to move on. “It was really just a blip,” he says. “We are ready to move past it and leave the DAO story behind us.” Green, who’s organizing an ethereum conference at this summer’s Burning Man festival in the Nevada desert, has kept a sense of humor about it. “The Robin Hood group was just a s--- show,” he says with a laugh. “I hope the movie portrays it better than it actually was.” As for the bug itself, apparently many smart people looked at the code before Gün but missed one major flaw. The order of commands in the code allowed DAO token holders to withdraw any profit they’d made from their investments. It reads “withdrawRewardFor(msg.sender)” and adds, almost improbably, a note to anyone reading the code that says, “be nice, and get his rewards.” That’s line 667—let’s call it “The Neighbor of the Beast Bug.” If the withdraw line had come after these lines:
totalSupply -= balances[msg.sender]; balances[msg.sender] = 0; paidOut[msg.sender] = 0; return true;
the attack wouldn’t have been possible, Jentzsch says. But if the code had been in the correct order, the reward parameter wouldn’t have worked. As for the note, this line of code was meant to allow investors to withdraw any profit—“Reward”—their investments had earned. Instead it became one of the biggest backdoors in hacking history. It would have been better to not pay rewards during the split function from the DAO, what we’ve been referring to here as the escape pods, according to Jentzsch. Another decision he made when he had no idea of the bug shows how quirky and unforgiving code can be. “If the capital ‘T’ in line 666 had been a small ‘t,’ that would also have prevented the hack,” he says. Jentzsch has many regrets but insists no one was aware of the specific problems in lines 666-667 (other observers had pointed to flaws in other lines, just not here). Had more people looked, “it would have made no difference at all,” he says. “If you don’t know what to look for in a security audit, you won’t find it.” Even Gün, who had it in his grasp, let it go. “I still missed it,” he says. Green’s emotions are still raw related to Gün. “I actually got really pissed at him about this,” Green says. “He started bragging about how he found the bug.” He adds that it was “very irresponsible of him to not tell anyone of his inkling.” Still, Green “respects the hell out of Gün” and says they’ve since made amends. Asked to recount that night last June as he lay sick in bed, Gün says, “I came away from this thinking there’s potentially an issue.” But he’d consulted Daian, his grad student (“whom I trust”). Daian had said it’s “not exploitable.” Gün says that had he been certain of the danger, “I would have told people.” In a blog post that explained the mechanics of the DAO heist Daian published the night of the attack, he gave a shoutout to his professor in the acknowledgments. “Gün, we were so damn close—sorry it wasn’t quite enough this time :),” Daian wrote. As for the attacker (whoever he or she or they are) and the ethereum classic booty, Gün says, “Great, wonderful, he should cash out.” The hard fork proved it wasn’t just the DAO that needed to be fixed, but the ethereum blockchain itself. He says: “The fault lies somewhere on the system side as well.” But the fear that smart contracts are too clever by half and that by extension so is the ethereum blockchain itself—prevalent in the days following the DAO attack—has dissipated. At least that’s the market’s verdict, judging by the price of ether. After the attack, it traded from $10 to $12 for about nine months. Then in March it took off; it’s valued at $341.19 as of June 12. (That would have valued the DAO at $4.1 billion, but let’s not even go there.) Ethereum classic has risen as well, and it now trades for $18.71. Both versions of ether remain viable, in other words. The thief holds one; the revisionists, the other. Going forward, the choice is really: Whom would you rather believe? Since the hard fork, the attacker ended up making off with his ethereum classic. That means he got away with about $67.4 million, assuming the stash hasn’t been sold. Not too shabby, 0xF35e2cC8E6523d683eD44870f5B7cC785051a77D.
Leising covers market structure at Bloomberg News in New York.
To contact the author of this story: Matthew Leising inNew York at [email protected]
To contact the editor responsible for this story: Joel Weber at [email protected]
Limite de devise; Création de bloc; Langage de script; Coût; Limites de bloc; Comptes; Performances de l'algorithme; Plans futurs; Bitcoin vs. Ethereum: Tableau de comparaison; Résumé de Bitcoin contre Ethereum; La récente augmentation stratosphérique de la valeur de certaines crypto-monnaies a amené une prise de conscience mondiale de l ... Impact de ces mises à jour sur le prix. S'il est impossible de prédire de quoi sera fait l'avenir, on peut toutefois affirmer avec une quasi certitude que l'implémentation de ces nouveautés sur le réseau Ethereum fera augmenter les cours de cette devise cryptographique.. Du fait de la congestion du réseau Ethereum à cause de son nombre maximum de 15 transactions à la seconde, de ... La plateforme de trading de cryptomonnaies StormGain possède un portefeuille ETH intégré avec lequel vous pouvez gagner 10 % d'intérêt annuel sur votre devise. Trading de cryptomonnaies L'ethereum est la cryptomonnaie qui a la deuxième plus grande part de marché après le bitcoin. Ethereum, est une plate-forme décentralisée qui permet de faire fonctionner des applications sans interruption, sans fraude, sans censure des ingérences de tiers. Ethereum utilise la technologie blockchain pour permettre aux utilisateurs du réseau d'envoyer et de recevoir des paiements. Coinbase is a secure platform that makes it easy to buy, sell, and store cryptocurrency like Bitcoin, Ethereum, and more. Based in the USA, Coinbase is available in over 30 countries worldwide.
Il y a 2 semaines, tous les spéculateurs de notre communauté ont été mis au courant du potentiel explosif de cette crypto devise. Nombreux sont ceux à être entrés en position avant le top ... como ganahar btc super rapido muito bom! https://youtu.be/Ix-k1sTeb70 Galera vou postar assim q atingir o limite de 0.02 eth Link para download do ETH https:... Toutes les swing trades de ces dernieres (et analyses techniques) années sur le Bitcoin. ... Routine pour swing trader le bitcoin et les crypto devises bitcoin, Ethereum, Ripple, Dash Cette vidéo explique avec des mots simples l'Ethereum. On va découvrir pourquoi l'Ethereum a été crée. En quoi l'Ethereum est INCROYABLE. Pour en savoir plus sur les cryptomonnaies et la ... Suite de notre série de « hors série » consacrée à la blockchain et à la crypto-monnaie. Après le Bitcoin on aborde avec Sébastien et Xavier la chaine de bloc Ethereum et ses applications ...