Skip to main content

133 posts tagged with "Security"

Cybersecurity, smart contract audits, and best practices

View all tags

Solana's $270M Drift Aftermath: Can STRIDE Security and 'Agentic Payments Leader' Coexist?

· 12 min read
Dora Noda
Software Engineer

On April 1, 2026, a North Korean intelligence operation that had been running for six months drained $270 million from Drift Protocol. Six days later, the Solana Foundation did something unusual for a chain nursing its largest ever DeFi loss: it declared itself "the leader in agentic payments" and rolled out a continuous security program in the same breath.

That is not a typo and it is not a coincidence. Solana is trying to run two narratives at once. Defensive credibility through STRIDE, a foundation-funded security regime with 24/7 monitoring and a formal incident response network. Offensive positioning as the chain AI agents will use to move money. The question is whether a market that just watched $270 million walk out the front door will buy either story, let alone both.

The $4.8M Press Release: How South Korea's Tax Agency Leaked a Seed Phrase and Got Saved by an Illiquid Token

· 10 min read
Dora Noda
Software Engineer

On February 26, 2026, South Korea's National Tax Service (NTS) celebrated a major enforcement win. It had raided 124 high-value tax evaders, seizing roughly 8.1 billion won ($5.6 million) worth of digital assets. The agency proudly published a press release, complete with high-resolution photographs of the seized Ledger hardware wallets.

There was just one problem. One of those photographs showed the handwritten recovery phrase, fully unredacted, pixel-perfect, and globally broadcast.

Within hours, 4 million Pre-Retogeum (PRTG) tokens — nominally valued at $4.8 million — had been drained. Then, about 20 hours later, the attacker sent them back. Not out of remorse, but because the token's daily trading volume was $332 and unloading it was mathematically impossible. South Korea got bailed out by the very illiquidity that made the seizure economically meaningless in the first place.

The incident is funny, embarrassing, and illuminating — all at once. It's also a warning. As governments increasingly hold billions in seized crypto, the gap between enforcement ambition and custody competence has never been wider.

The Anatomy of a $4.8 Million PR Disaster

The NTS wanted vivid proof of its enforcement muscle. Rather than crop or blur the seized Ledger devices, staff released original photos straight from the raid. One image captured a piece of paper next to a Ledger Nano — the backup phrase the target had apparently hand-written and kept alongside the device.

The agency's later apology said the quiet part out loud: "In an effort to provide more vivid information, we did not realize that sensitive information was included and carelessly provided the original photo." The translation: nobody on the press team understood that a 12-word sequence next to a Ledger is the master key, not decoration.

Within hours of publication, an unidentified attacker reconstructed the wallet. On-chain forensics show a textbook sequence:

  1. Gas prep — The attacker deposited a tiny amount of Ethereum to the seized wallet to cover transaction fees.
  2. Extraction — They moved the 4 million PRTG tokens in three carefully sized transactions to an external address.
  3. Wait — Then, nothing happened.

Because there was nothing they could do with the haul.

Why the Illiquidity Saved Korea

PRTG, or Pre-Retogeum, is the kind of token most people have never heard of, and for good reason. It trades on exactly one centralized exchange — MEXC — and registers approximately $332 in 24-hour volume. According to CoinGecko, a sell order of just $59 would crater the price by 2%.

The math of trying to cash out $4.8 million against that liquidity is grim. Even spreading the liquidation over weeks, the attacker would have:

  • Signaled obvious theft patterns to MEXC's compliance team
  • Collapsed the price by 90%+ before meaningful volume cleared
  • Drawn instant attention from South Korean authorities already investigating

Approximately 20 hours after the initial transfer, the attacker gave up. An address tied to the "86c12" thief wallet sent all 4 million PRTG tokens back to the original addresses. The press release had exposed a master key to a vault full of monopoly money.

If the seized tokens had been Bitcoin, Ether, or a Tier-1 stablecoin, the funds would be gone. The same OpSec failure against USDT or ETH would have ended with a 10-minute Tornado Cash mix and zero recoverable assets. PRTG's terrible market was the accidental airbag.

This Is Not the First Time

The Korean crypto-custody record has cracks that go beyond one press release. In 2021, police investigators lost 22 BTC (worth millions at current prices) from a cold wallet stored in an evidence vault. The root cause was the same: mishandled mnemonic phrases, no multi-sig policy, and a custody chain that treated crypto like any other seized object.

Two incidents, five years apart, in two different law enforcement arms of the same country. The pattern is structural, not a single bad day for the NTS press office.

And Korea is hardly alone. Law enforcement agencies worldwide now routinely seize hardware wallets during raids — and almost none of them have published internal standards for:

  • Photographing evidence without exposing recovery material
  • Transferring seized funds to government-controlled multi-sig wallets
  • Rotating custody from the original hardware to fresh keys
  • Role-based access between forensics, prosecutors, and treasury

Most agencies treat a Ledger like a smartphone. They bag it, tag it, and file it. The result is a growing systemic risk as national crypto holdings scale into the billions.

The Gap Between Enforcement and Custody Competence

Compare the NTS incident with the U.S. Department of Justice's November 2025 seizure of $15 billion in Bitcoin — roughly 127,271 BTC — linked to the Prince Group's pig-butchering operation. That haul, the largest forfeiture in DOJ history, was executed with Chainalysis-powered tracing, coordinated international warrants, and immediate transfer to Treasury-controlled custody. Chainalysis alone has supported hundreds of government seizures, helping secure an estimated $12.6 billion in illicit crypto over a decade.

The U.S. government now holds approximately 198,012 BTC under its Strategic Bitcoin Reserve framework — roughly $18.3 billion at current prices. El Salvador holds 7,500 BTC through direct purchases. Bhutan has accumulated ~6,000 BTC via state-linked mining. Governments globally now hold more than 2.3% of all Bitcoin.

The operational gap between the DOJ's sophisticated tooling and the NTS's unblurred JPEGs is not a difference in sophistication — it's a difference in whether anyone has written the standard operating procedures yet. Many agencies are still treating crypto custody as an improv exercise.

That gap becomes existential as sovereign holdings grow. A single OpSec failure at the DOJ scale — an unredacted transaction hash, an exposed cold-storage address, a poorly rotated signer — could drain billions, not millions. And Bitcoin has no illiquidity safety net.

What Professional Custody Actually Looks Like

The institutional custody industry has already answered the questions that tripped up the NTS. Modern sovereign and enterprise custody stacks rely on:

  • Multi-sig with MPC — A 3-of-5 threshold where each key share is itself protected by multi-party computation. No single signer, device, or compromised employee can move funds. The complete private key never exists in one place.
  • Air-gapped cold storage — Seized assets are immediately swept to wallets whose private keys have never touched an internet-connected device. The original hardware becomes evidence, not an active hot signer.
  • Role separation — Forensics handles custody, prosecutors handle paperwork, and a designated treasury function signs transactions. No one role holds both the keys and the narrative.
  • Evidence-safe documentation — Photographs of seized devices are redacted at the camera, not the editorial review. Standard operating procedures assume any image with a wallet will eventually leak.

None of this is exotic. Firms like Anchorage, BitGo, Fireblocks, and a growing roster of MPC-based custodians offer government-tier solutions off the shelf. The technology is not the bottleneck. Institutional discipline is.

The Lessons That Will Outlive This Headline

The NTS incident is funny because it ended well. But it contains four lessons that regulators, enforcement agencies, and crypto-native institutions should internalize now, while the stakes are still measured in millions rather than tens of billions.

1. Standard operating procedures must assume photographic evidence leaks. Any raid image containing a hardware wallet should default to redaction or exclusion. Communications teams should not be the last line of defense on cryptographic secrets.

2. Seized crypto must be rotated immediately. The moment assets are recovered, they should be moved to a government-controlled multi-sig wallet with fresh keys. The original hardware becomes evidence — it should never remain an active custody device once the raid is on the record.

3. Illiquidity is not a security strategy. Korea got lucky because PRTG was un-dumpable. The next leaked seed phrase will reveal a wallet full of ETH, USDC, or SOL, and no amount of market depth will claw those funds back.

4. Crypto enforcement training needs the same rigor as evidence-handling training. Officers photographing a seized vehicle don't accidentally release the VIN + registration keys to the public. The equivalent discipline for hardware wallets does not yet exist in most agencies.

Infrastructure for the Post-Amateur Era

As governments move from seizing crypto to holding it as sovereign reserves, the entire ecosystem — not just enforcement agencies — has to level up. Tax authorities, court systems, and national treasuries need institutional-grade infrastructure: reliable multi-chain data access to monitor seized addresses, high-availability node services for transaction submission, and audit-grade APIs that produce defensible chain-of-custody records.

BlockEden.xyz provides enterprise-grade blockchain API infrastructure across 27+ chains, purpose-built for the compliance and reliability demands of institutional custody. Explore our API marketplace if you're building the tools that help serious custodians avoid becoming the next illustrative headline.

The Next One Will Be Worse

The NTS seed-phrase leak will be remembered as the funny one — the incident where a token no one had heard of protected a government from its own PR team. The next one won't have that luxury.

As sovereign Bitcoin reserves grow, as tokenized assets migrate to public chains, and as enforcement seizures become routine line items rather than career-defining busts, the compounding exposure to a single OpSec mistake becomes enormous. Every photographer, every intern, every well-meaning press officer is now a potential vector for a nine-figure drain.

The irony is that the cryptography is not the problem. Ledger did its job. Ethereum did its job. The blockchain faithfully executed the transfer of 4 million tokens to a stranger, exactly as the signer instructed. The failure was entirely human — a press team treating a 12-word phrase as photographic decoration.

Crypto doesn't need better wallets. It needs better habits. And in 2026, with governments holding 2.3% of all Bitcoin and billions in other digital assets, the margin for learning those habits in public is rapidly closing.

Sources:

Google's Quantum AI Whitepaper Maps Five Attack Paths That Put $100B of Ethereum at Risk

· 12 min read
Dora Noda
Software Engineer

One key cracked every nine minutes. The top 1,000 Ethereum wallets emptied in under nine days. A 20-fold collapse in the qubit count needed to break the cryptography that secures more than $100 billion of on-chain value. These are not the projections of a doomsday Twitter thread — they come from a 57-page whitepaper Google Quantum AI published on March 30, 2026, co-authored with Ethereum Foundation researcher Justin Drake and Stanford cryptographer Dan Boneh.

For a decade, "quantum risk" lived in the same intellectual neighborhood as asteroid strikes — real, catastrophic, but distant enough that no one had to act. The Google paper relocated the threat. It mapped five concrete attack paths against Ethereum, named the wallets, named the contracts, and gave engineers a number — fewer than 500,000 physical qubits — that maps directly onto the published roadmaps of IBM, Google, and a half-dozen well-funded startups. Q-Day, in other words, just acquired a calendar invite.

A 57-Page Paper That Changes the Threat Model

The paper, titled "Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities," is the first time a major quantum hardware lab has done the unglamorous engineering work of translating Shor's algorithm from a 1994 theoretical attack into a step-by-step blueprint against the elliptic-curve discrete logarithm problem (ECDLP) that secures Bitcoin, Ethereum, and virtually every chain that signs transactions with secp256k1 or secp256r1.

Three things make the paper land harder than prior estimates.

First, the qubit count. Earlier academic work pegged the resource requirement for breaking 256-bit ECDLP at multiple millions of physical qubits. The Google authors knock that down to fewer than 500,000 — a 20-fold reduction driven by improved circuit synthesis, better error-correction overhead, and tighter routing of magic states. IBM has publicly committed to a 100,000-qubit machine by 2029. Google has not published a comparable target, but its in-house roadmap is widely understood to be similar in slope. Half a million qubits is no longer a number that requires hand-waving toward the 2050s.

Second, the runtime. The paper estimates that once a sufficient machine exists, recovering a single private key from a public key takes on the order of nine minutes of quantum runtime — not days, not hours. That number matters enormously, because it determines how many high-value targets an attacker can drain inside the window between detection and response.

Third, and most consequential for Ethereum specifically, the authors do not stop at "ECDSA is broken." They walk through the protocol stack and identify five distinct attack surfaces, each with named victims.

The Five Attack Paths Against Ethereum

The paper organizes Ethereum's quantum exposure into five vectors, deliberately avoiding the lazy framing of "all crypto dies on the same day."

1. Externally Owned Account (EOA) compromise. Once an Ethereum address has signed even a single transaction, its public key is permanent and visible on-chain. A quantum attacker derives the private key in roughly nine minutes, then drains the wallet. Google's analysis identifies the top 1,000 wallets by ETH balance — collectively holding about 20.5 million ETH — as the most economically rational targets. At nine minutes per key, an attacker clears the entire list in under nine days.

2. Admin-controlled smart contract takeover. Ethereum's stablecoin economy and most production DeFi protocols rely on multisigs, upgrade keys, and minter roles controlled by EOAs. The paper enumerates 70-plus admin-controlled contracts, including the upgrade or minter keys behind major stablecoins. Compromising those keys does not just steal a balance — it lets the attacker mint, freeze, or rewrite the contract logic. Google estimates roughly $200 billion in stablecoins and tokenized assets sit downstream of these vulnerable keys.

3. Proof-of-stake validator key compromise. Ethereum's consensus layer uses BLS signatures, which are also based on elliptic-curve assumptions and equally broken by Shor's algorithm. An attacker who recovers enough validator private keys can, in principle, equivocate, finalize conflicting blocks, or stall finality. The exposure here is not stolen ETH — it is the integrity of the chain itself.

4. Layer 2 settlement compromise. The paper extends the analysis to major rollups. Optimistic rollups depend on EOA-signed proposer and challenger keys; ZK rollups depend on operator keys for sequencing and proving. Compromising those keys does not break the underlying validity proofs, but it does let an attacker steal sequencer fees, censor exits, or — in the worst case — rug the bridge that holds canonical L2 deposits.

5. Permanent forgery of historical data availability. This is the path that cryptographers find most disturbing. The original Ethereum trusted setup (and the KZG ceremony powering EIP-4844 blobs) relies on assumptions that a sufficiently powerful quantum machine can break by reconstructing setup secrets from public artifacts. The result is not theft — it is a permanent ability to forge historical state proofs that look valid forever. There is no rotation that fixes data already published.

The five paths collectively put more than $100 billion at immediate risk, and an order of magnitude more at structural risk if confidence in chain integrity collapses.

Ethereum Is More Exposed Than Bitcoin

A subtle but important conclusion of the paper: Ethereum's quantum exposure runs deeper than Bitcoin's, despite both chains using the same secp256k1 curve.

The reason is account abstraction in reverse. Bitcoin's UTXO model, particularly post-Taproot, supports addresses derived from a hash of the public key — meaning the public key is only revealed at spend time. A user who never reuses an address has a one-shot exposure window measured in the seconds between broadcast and confirmation. Funds parked in unspent, untouched addresses are quantum-safe by construction.

Ethereum has no such property. The moment an EOA signs its first transaction, its public key is on-chain forever. There is no "fresh address" pattern that hides it. A wallet that has transacted even once is a static target whose vulnerability does not decay over time. The 20.5 million ETH in the top 1,000 wallets is not just theoretically exposed — it is permanently fingerprinted on a public ledger waiting for a sufficiently powerful machine.

Worse, Ethereum cannot rotate keys without abandoning the account. Sending funds to a new address creates a new account with a new public key, but anything still associated with the old address — ENS names, contract permissions, vesting positions, governance allowlists — does not move with the funds. The migration cost is not just the gas to move tokens; it is the cost of unwinding every relationship the old address has accumulated.

The 2029 Deadline and Ethereum's Multi-Fork Roadmap

In parallel with the Google paper, the Ethereum Foundation launched pq.ethereum.org in March 2026 as the canonical hub for post-quantum research, the roadmap, open-source client repos, and weekly devnet results. More than 10 client teams are now running interoperability devnets focused on post-quantum primitives, and the community has converged on a target of completing L1 protocol-layer upgrades by 2029 — the same year Google has set for migrating its own authentication services off ECDSA.

The roadmap is staged across four upcoming hard forks rather than one big-bang fork. Roughly:

  • Fork 1 — Post-Quantum Key Registry. A native registry that lets accounts publish a post-quantum public key alongside their ECDSA key, enabling opt-in PQ co-signing without breaking existing tooling.
  • Fork 2 — Account Abstraction Hooks. Building on EIP-8141's "Frame Transaction" abstraction, accounts can specify validation logic that no longer assumes ECDSA, providing a native off-ramp toward lattice-based schemes such as ML-DSA (Dilithium) or hash-based SLH-DSA (SPHINCS+).
  • Fork 3 — PQ Consensus. Validator BLS signatures are replaced with a post-quantum aggregation scheme, the largest engineering lift in the entire roadmap because of the signature-size implications for block propagation.
  • Fork 4 — PQ Data Availability. A new trusted setup or transparent setup for blob commitments that does not depend on ECC assumptions, closing the historical-forgery vector.

Vitalik Buterin signaled the urgency in late February 2026 when he wrote that "validator signatures, data storage, accounts, and proofs all need to be updated" — naming all four forks in a single sentence and implicitly conceding that piecemeal upgrades will not suffice.

The challenge is not the cryptography. NIST has already standardized ML-KEM, ML-DSA, and SLH-DSA. The challenge is rolling those primitives through a live $300B+ network without breaking thousands of dapps that hard-code ECDSA assumptions, and without leaving billions of dollars of dormant ETH stranded in wallets whose owners never migrate.

The Frozen-or-Stolen Dilemma

Both Ethereum and Bitcoin face a governance question that no purely technical roadmap resolves: what happens to coins in vulnerable addresses whose owners never migrate?

The Ethereum Foundation's own FAQ frames the choice in plain terms: do nothing, or freeze. Doing nothing means that on Q-Day, an attacker drains every dormant address with a known public key — including the genesis-era wallets, the legacy ICO buyers, the lost-key holders, and a meaningful slice of Vitalik's own historical contributions to public goods funding. Freezing means social-consensus action to invalidate withdrawals from any address that has not migrated by a deadline.

Bitcoin's BIP 361, "Post Quantum Migration and Legacy Signature Sunset," lays out the same trilemma in a three-phase framework. Co-author Ethan Heilman has publicly estimated that a full Bitcoin migration to a quantum-resistant signature scheme would take seven years from the day rough consensus forms — which means BIP 361 needs to be substantively merged in 2026 to hit the 2033 horizon, and probably much sooner to hit 2029.

Neither chain has a precedent for mass coin invalidation. Ethereum did roll back the DAO hack in 2016, but that was a single-event reversal, not the deliberate freezing of millions of unrelated wallets based on cryptographic posture. The decision will inevitably read as a referendum on whether immutability or solvency is the chain's deeper commitment.

What This Means for Builders Right Now

The 2029 deadline can feel comfortably distant, but the decisions that determine whether a project is ready or scrambling get made in 2026 and 2027. A few practical implications surface immediately.

Smart contract architects should audit for ECDSA assumptions. Any contract that hard-codes ecrecover, embeds an immutable signer address, or depends on EOA-signed proposer keys needs an upgrade path. Contracts deployed without admin keys today look elegant; in a post-quantum world, they may look unrecoverable.

Custodians need to begin key-rotation hygiene now. A custody provider with billions under management cannot rotate every wallet in a single Q-Day weekend. Rotation, segregation by exposure tier, and pre-positioned PQ-ready cold storage are 2026 problems, not 2028 ones.

Bridge operators face the highest urgency. Bridges concentrate value behind a small number of multisig keys. The first economically rational quantum attack will not target a randomly chosen wallet — it will target the most valuable single key in the ecosystem. Bridges should be the first to implement hybrid PQ + ECDSA signing.

Application teams should track the four-fork roadmap. Each Ethereum hard fork in the PQ sequence will introduce new transaction types and validation semantics. Wallets, indexers, block explorers, and node operators that lag the upgrade window will degrade gracefully if they planned for it and break catastrophically if they did not.

BlockEden.xyz operates production RPC and indexing infrastructure across Ethereum, Sui, Aptos, and a dozen other chains, and tracks each network's post-quantum migration roadmap so application developers don't have to. Explore our API marketplace to build on infrastructure designed to survive the next decade of cryptographic transitions, not just the current one.

The Quiet Revolution in Threat Modeling

The deepest contribution of the Google paper may be sociological rather than technical. For ten years, "quantum-resistant" was a marketing claim that mostly attached to projects no one used. The serious chains treated PQ migration as a problem for the next generation of researchers. The 57 pages from Google, Justin Drake, and Dan Boneh shifted that posture in a single publication.

Three quantum-cryptography papers have landed in three months. A consensus has formed that the resource gap between current quantum hardware and a cryptographically relevant machine is closing faster than the gap between current chain protocols and post-quantum readiness. The intersection of those two curves — somewhere between 2029 and 2032, depending on whose estimate proves correct — is the most important deadline crypto infrastructure has ever faced.

The chains that treat 2026 as a year for serious engineering work, not vague reassurance, will still be standing on the other side. The ones that wait for the first headline about a stolen Vitalik wallet will not have time to react.

Sources

Circle's Arc Blockchain Is Building the Quantum-Proof Foundation for the Next Decade of Finance

· 10 min read
Dora Noda
Software Engineer

On March 31, 2026, Google quietly published a research paper that sent shockwaves through the cryptography community: breaking the elliptic curve encryption securing Bitcoin and Ethereum might require as few as 500,000 physical qubits — roughly 20 times fewer than Google's own 2019 estimate suggested. Under ideal conditions, a sufficiently powerful quantum computer could crack a private key from a broadcast transaction in approximately nine minutes. Given Bitcoin's 10-minute average block interval, that means a 41% chance an attacker could steal a transaction before it confirms.

The quantum threat to blockchain just moved from theoretical to urgent. And Circle, the issuer of the world's second-largest stablecoin, saw it coming.

South Korea's $4.8M OpSec Catastrophe: How the National Tax Service Photographed Its Own Seed Phrase and Got Robbed Twice in 48 Hours

· 12 min read
Dora Noda
Software Engineer

Imagine raiding a tax evader's apartment, seizing four hardware wallets, and then publishing a triumphant press release showing the recovered evidence — with the wallet's seed phrase clearly visible in the photo. Now imagine a thief drains the wallet within hours, returns the tokens as a warning, and a second thief steals them again before your agency can react.

That is not a crypto Twitter thought experiment. That is exactly what happened to South Korea's National Tax Service (NTS) in late February 2026 — a blunder that cost the government roughly $4.8 million in seized Pre-Retogeum (PRTG) tokens and exposed how unprepared most state agencies are to hold digital assets they increasingly confiscate.

Bitcoin's $1.3T Quantum Clock: The 9-Minute ECDSA Break and BIP-360 Race to Save 6.9M BTC

· 11 min read
Dora Noda
Software Engineer

Nine minutes. That is the window a 57-page Google Quantum AI paper says a future quantum computer would need to reverse-engineer a Bitcoin private key from an exposed public key — short enough to fit inside a single block confirmation, long enough to rewrite the risk profile of the entire $1.3 trillion network. The paper, co-authored with researchers from Stanford and the Ethereum Foundation and published on March 30, 2026, did something subtler than predict the apocalypse. It shrank the number that matters. The resources needed to break ECDSA dropped by a factor of 20 compared to prior estimates. Google now internally targets post-quantum migration by 2029.

The $45M AI Agent Exploit That Changed DeFi Security Forever

· 8 min read
Dora Noda
Software Engineer

When an autonomous AI trading agent drained $45 million from DeFi protocols in early 2026, the attack didn't exploit a single line of smart contract code. Instead, attackers poisoned the oracle data feeds that AI agents trusted implicitly, turning the agents' own speed and autonomy into weapons against the protocols they were designed to protect. Welcome to the era where the most dangerous vulnerability in crypto isn't in the code — it's in the AI.

Operation Atlantic: How Coinbase, the Secret Service, and the NCA Froze $12M in Stolen Crypto in One Week

· 9 min read
Dora Noda
Software Engineer

In January 2026 alone, phishing attacks drained more than $311 million from crypto users. By the time most victims realized their wallets had been compromised, the funds were already cascading through mixers and cross-chain bridges. For years, law enforcement played catch-up — investigating crimes months after they occurred, recovering pennies on the dollar.

Then came Operation Atlantic.

Launched on March 16, 2026, from the UK National Crime Agency's London headquarters, Operation Atlantic brought together the US Secret Service, Canadian law enforcement, blockchain analytics firms Chainalysis and TRM Labs, and crypto exchanges Coinbase and Kraken for an unprecedented week-long sprint. The result: $12 million frozen, $45 million in fraud mapped, 20,000 victim wallets identified across 30 countries, and over 120 scam domains disrupted — all within seven days.

This was not a typical investigation. It was a proof of concept that public-private partnerships can shift crypto security from reactive forensics to real-time intervention.

Blockchain Evidence Reaches Courtroom Standard: How On-Chain Data Is Convicting Terrorists

· 10 min read
Dora Noda
Software Engineer

For years, crypto's critics argued that its pseudonymity made it the perfect vehicle for criminals. They were half right — and that half is now being used against them in court. When Indonesian authorities charged three individuals with financing ISIS operations in Syria, the convictions did not rest on wiretaps or informants. They rested on wallet addresses, transaction hashes, and on-chain fund flows — blockchain data that traveled from a domestic crypto exchange, through a foreign platform, and directly into an ISIS-linked fundraising campaign. TRM Labs supplied the forensic tooling; Indonesia's courts supplied the verdict. The era of blockchain evidence has arrived.