Discussion about this post

User's avatar
awbvious's avatar

"

The question now is: Why?

"

I wondered if the answer might simply be in the Michael Lewis Wikipedia page. And sure enough, the question was answered in the first two paragraphs.

"Lewis wrote Moneyball: The Art of Winning an Unfair Game (2003), in which he investigated the success of the Oakland Athletics baseball team and their general manager Billy Beane. His 2006 book The Blind Side: Evolution of a Game was his first to be adapted into a film, The Blind Side (2009). In 2010, he released The Big Short: Inside the Doomsday Machine. The film adaptation of Moneyball was released in 2011, followed by The Big Short in 2015.

"Lewis's books have won two Los Angeles Times Book Prizes and several have reached number one on The New York Times Best Seller list, including his most recent book, Going Infinite (2023)."

The man wants a movie deal and accepting that he's been wrong in his book would likely jeopardize it.

"

a lot of people are hesitant to stay on the platform. I am at least for the moment rationalizing it to myself

"

“At least for the moment” often becomes “only for that moment.” And often that “moment” is thought in retrospect to have been too long.

"

https://www.hollywoodreporter.com/lifestyle/lifestyle-news/strange-saga-jeffrey-epstein-s-link-brock-pierce-1240462/

"

Holy f'ing ponziballs... This is insane. I haven't finished reading and already I'm amazed. I mean, I've read a little about Pierce, but this is crazy.

The Trump connections are concerning for their more current implications, but this also gives a ton of credence to the connections to SBF and child abuse predators made in the last Substack, I.e. the book excerpt Child of the Man.

So one thing not reported enough is the Tether connection to SBF (Alameda helping with, possibly, money laundering for the Chinese via Tether). Now, I have made a few jokes that SBF's just too young to have gone to Epstein's island (okay, too young to go there for reasons other than to be abused). But the number of interactions with those who did frequent that island, are just too rich. And of course the Bahamas aren't that far to that island either.

Now, you might ask why bother with connections?

A) Because sexual abuse, understandably, occurs mostly behind closed doors. Which means allegations need to consider circumstantial evidence, and often needs a lots of it. Which means we need to collect all that we can, as best we can, to then carefully weigh each piece, and finally look at it in totality.

B) Child abuse is simply indefensible. It just is. Few things are, but child abuse is.

Let's say your locality makes it illegal to hold crypto. Well, there are a lot of reasons why one might argue that such a law shouldn't exist. Such as an authoritarian state might be using state-approved financial instruments simply to surveil and oppress you, perhaps because you are of a political/religious minority. But who runs the authoritarian state? Adults. Consenting adults. Consenting adults that quite possibly may be consenting to hurt you, take away your life, liberty, and pursuit of happiness. Children are not concenting adults. And they definitely not oppressors. They are incapable. And history has no evidence of systematic oppression of adults by children. It's a laughable concept. Thus, anyone who hurts children, particularly in unequivocal ways, such as those in the sex abuse cases of Epstein, simply have no defense.

Unfortunately, it's so self-evident, it is almost blinding. Something as laudable as protecting children can easily be used as a scapegoat for authoritarian behavior. For example, taking away net neutrality in the name of protecting children. Because who would supposedly be in charge of what you can do on the internet once net neutrality is gone? ISPs. ISPs are run by consenting adults. Consenting adults who absolutely have a history of abusing their power as monopolies. Putting power in the hands of abusers in the name of prevention of abuse.

It's complex, but I think that's why the stories of connections do need to be told, the circumstantial evidence presented in detail and in context. So that instead of people thinking, “woah, crypto bad,” they think, “woah, what's up with Tether? How come I never hear about this kind of stuff with, say, Circle? Seems like it's not a crypto thing. But, a Tether thing. And, woah, what about these stories of these people they associate with? What does this say about anyone willing to have themselves ‘tethered’ with such connections?”

However, check out this caveat Tay found in the CertiK report, and ask whether you’d put your name on it:

Which name? You mean the nom-de-internet I myself use for anything crypto?

Consider someone might want to write about someone who is rich and powerful, and likely a vindictive fraudster. Should the writer use their own name, when they themselves are not rich and powerful? When they are unlikely to get any riches or power from it? Of course, using a pseudonym would make it difficult to get published, or keep anything published, as any publisher could then turn around and perversely use the anonymity of the author as an excuse to squash after the fact. But is it worth it to publish under normal identity when it's so high risk and low personal reward? Did Satoshi Nakamoto think that when they invented Bitcoin anonymously it was likely going to make them rich or more likely a target?

I too think Certik is a joke. Or rather their audits are. But not for being willing to certify even though the team wants to stay anonymous.

In fact Certk can probably argue: “Hey, all we are saying is we did some kind of glancing in their general direction, and that's all our certification attests to when you actually read the fine print. And really, we could do the most thorough audit in the world of some existing code, and they could push an upgrade the next day, and not recertify the upgrade, making the certification useless, and still advertise the stale certification, and most people would have no idea. It's all theater based on vibes when it comes to most audits as much as it is vibes assuming governance tokens and protocol votes will actually have the final say in what happens in these ‘decentralized’ apps we certify.”

I'll admit, Certik has proven to be pretty bad compared to other services, like Immunefi, whose big bounty program is considered one of the best, if not the best. But the problem isn't with Certik’s willingness to work with anonymous individuals. It's their willingness to work with just about anybody and though they will say when their rubber stamp is a rubber stamp, they don't seem to care when customer after customer claims a low-fee, rubber-stamp audit is more than that nor reveals when their audit becomes stale. That's the big problem. They should be putting those “D”apps on blast (not Blast, of course, no way that airdrop thirst trap scheme would have worked during a crypto winter) when they pull that s***. The fact Certk doosn't tells you all you need to know.

A First-Person Account of “Pig Butchering”

That was heart wrenching. And I bet not even that unusual. Probably many “pigs” intend the same as him to never send money, to be wary. And wouldn't if it weren't something as weird as crypto where it seems like, yeah, someone can be really rich almost randomly. (No, they can't. But, yes, it is often presented that way.) In a multiverse, he got fatted up 999 times, and didn't get slaughtered. But 1 time. Something happened, one bad day, one transgression, followed by another, and suddenly he can't tell his family how deep he’s in. In the non-multiverse, after 998 more pig attempts, “she'll” get her slaughter from someone else. What's that they say in cybersecurity? Blue team has to win every time. Red team has to win just once.

Expand full comment
3 more comments...

No posts