Grunching the Seth Green thing a bit but skimmed that twitter thread and it says Green was phished as opposed to signing a txn to send his bored ape away. So like someone got his private key basically? Like he entered it on one of those fake MM scam pop-ups? Or does lawbro have that part wrong. Also I agree this is all made up and for TV entertainment
Seems like that would be pretty clear case that a court system has probably dealt with before then. Basically what would court do if someone signed away something without reading the terms and conditions.
I wonder if the opinion would be different if he lost his private keys to a phishing attack instead. I guess thatâs probably also a similar condition to something thatâs happened before non-blockchain.
This isnât crypto-specific, but man I really hate that weâve gotten to the point where anything goes on the Internet. Someone breaks into your house and takes your stuff, very bad serious crime, you are the victim. Someone victimizes you on the Internet, and its just lol you dummy you got GOT.
Like youâre supposed to just tip your cap to the scammers and thieves that steal and destroy and tell them âGood game, sir, you really got me that time! Fair play!â
Iâve been told by a lawyer that Terms and Conditions arenât the be all and end all and if you can show a court they are unreasonable they can rule that they are not enforceable. But IANAL so :shrug:
At the end of the day, someone must have produced a crypto signature authorizing the transfer of the ape. It seems like this could only happen in three ways:
SG is tricked into generating the signature. On this case, he wins if the trickery amounts to fraud in the factum (i.e., he had no reasonable opportunity to understand what he was signing).
SG intentionally delegated the authority to transfer apes to someone else, either by custody or sharing his private key or by doing some kind of on-chain delegation, then the delegate did something they werenât supposed to. Here SG should lose no matter what.
The hacker generates the signature without SGâs involvement, by stealing the private key, or some zero-click exploit. This is the interesting case. Arguably, by making something transferable on the Ethereum network, you are telling the world that anyone who can prove they have your private key via crypto is authorized to transfer the thing. Even if someone uses knowledge of your private key to do something you donât actually authorize, you should be estopped from denying their authority when you said knowledge of your private key was proof of authorization. If that argument is correct, it would probably apply to the fraud in the factum case as well.
In this case I assume he could have read what he was clicking on but it was probably all gibberish. It said âgive away all my apesâ but would have looked to him like â097asdf087asd9f8as8d9fa827y5liuhdliufy38974y5tliuhserltiugys9834y5693h458iuhergâ
I agree with your point but i donât think itâs old man yells at clouds. Quite the opposite. The old men yelling at clouds are behind the internet isnât real. This will change eventually.
Just grumpy lately as my career has essentially morphed from make cool stuff to wait for the bad guys hack your shit and destroy everything, then get blamed for being too dumb to stop them.
This makes no sense to me. Itâs like saying âarguably, by having a vehicle which can be driven away merely with possession of a key, you are telling the world that if they have the key they can take your carâ. Itâs well established in computer fraud law that possession of credentials does not mean that their use is legitimate; you have to be authorized to use them by their owner.
I donât really see the similarity. With a crypto asset, you are telling people that title will be passed via cryptographic signature, and in fact thatâs the only way the asset will be transferred. It seems inequitable to allow you to do that, then repudiate a valid digital signature thatâs been relied on by a third party.
I think itâs crucial that youâve voluntarily accepted weird crypto rules. The inequity is that you announce that youâre going to enter into transactions by cryptographic signature, then try to repudiate transactions that were validly signed under the rules you chose to accept.
Our friend Rebekah Jones got charged with illegally accessing a computer system despite the fact that she accessed it with valid credentials, because merely possessing valid credentials does not establish a right to use them. The missing ingredient is authorization by the owner of the credentials. If you obtain Microsoftâs private keys and use them to digitally sign software in order to pretend that Microsoft released that software, of course thatâs a crime. I donât see how adding âon the blockchainâ changes any of this.