Receive all Cointelegraph news immediately in Telegram.
At first glance Mt.Gox seemed to be a great and very beneficial fraudulence scheme. It would be out of law, but still understandable if Mark Karpeles would leave the industry with pockets full of money.
At first glance Mt.Gox seemed to be a great and very beneficial fraudulence scheme. It would be out of law, but still understandable if Mark Karpeles would leave the industry with pockets full of money. After the private investigation of Bitcoin users was determined a surprising reason of the crash of the leading exchanger – the owner and CEO has lost the private keys with no ways to retrieve them.
It seems both crazy and impossible that so much people have trusted their money to such incompetent person. Now the attack from the cryptographic society continues with a more derogatory move.
Yesterday, the global web was shaken by a rumor that has all necessary characteristics to become truth. The IT and crypto enthusiast under the nickname “Nanashi” pretending to be a hacker from Russia has revealed the source code of the service. Its quality is a disgrace for every experienced developer.
The obtained code can be found on different Internet resources. At Pastebin was placed the part that performed the processing of transactions. Nanashi also provided a PDF file, some discussion audio file mostly in Japanese and the log from IRC. After his words, the private route of IRC carries even more evidence that still is not populated.
Some proven information source approves that the source code was partly designed by Mark Karpeles in person. The servers of the exchange service Mt.Gox were running on obsolete versions of Gentoo that allowed installing a rootkit via a weak point that is not mentioned.
The hacker Nilzor has looked through the provided material and determined many faults that cannot be tolerated in codes of global financial companies dealing with money of numerous users. He has said:
“Wow. This code is pretty bad. I mean, it's bad for a college project. It's horrible for a company dealing with large sums of money.”
The analysis made by Nilzor deserves to be published full-text without any alterations:
He also concluded:
“The amount of refactoring needed here to bring this code up to acceptable quality is simply staggering.”
Besides the opened data, Nanashi or a group of hackers he is working with has also scans of passports of the users of the service as well as employees – around 20 GB. However this fact requires further prove.
Follow us on Facebook
For updates and exclusive offers, enter your e-mail below.
Thank you for contacting us! We will reply to you as soon as possible.
Thank you for your interest in our franchise program.
We are considering your request and will contact you in due course. If you have any further queries, please contact: