Sometimes I read “this exange has been exploited because the oracle has been exploited”, but how does this happen? I am talking from the technological point of wiev, what does it happen? Do hackers target an oracle service hosted on a random computer on internet (how do they know which one to target?) and then what? What does it happen?

Share This Discussion

Leave a Comment

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.