AAVE
AAVE
Follow Topic
660.44K Views
46 Discussions
Topic Background
Lianyanshe
Lianyanshe
Crypto Newbie
03-17 01:18
The recent $50 million AAVE transaction being squeezed led many to immediately suspect a hacker attack, lamenting how a single person's negligence could cause such a massive loss. However, this is an inevitable consequence of the old DeFi architecture. Your orders, transaction paths, and scale are virtually exposed on-chain; once visible, they are subject to bot pricing, targeting, and exploitation. The so-called free market often boils down to precise hunting on the public information flow. This is precisely where the true value of Midnight (@MidnightNetwork) lies. It doesn't sell anonymity, but rather rational privacy. Users can prove their compliance, asset authenticity, and transaction validity without revealing their identity, positions, or transaction details. It uses a two-state ledger and zero-knowledge proofs to achieve both verifiability and privacy simultaneously. More importantly, Midnight isn't just a story. Its application scenarios include institutional DeFi, large-scale transactions, RWA, on-chain identity, medical data, and enterprise collaboration—any scenario requiring on-chain data but fearing information leakage is its primary battleground. The NIGHT + DUST design separates token value from usage costs, making privacy computing truly commercially viable. The AAVE incident illustrates one point: the most expensive thing on-chain isn't gas, but the fact that your asset information is seen by everyone in advance. Midnight aims to solve what Web3 must do to move towards commercialization. It's not just another privacy chain; it's more like a future privacy operating system for Web3. #night $NIGHT
The recent $50 million AAVE transaction being squeezed led many to immediately suspect a hacker attack, lamenting how a single person's negligence could cause such a massive loss. However, this is an inevitable consequence of the old DeFi architecture. Your orders, transaction paths, and scale are virtually exposed on-chain; once visible, they are subject to bot pricing, targeting, and exploitation. The so-called free market often boils down to precise hunting on the public information flow.

This is precisely where the true value of Midnight (@MidnightNetwork) lies. It doesn't sell anonymity, but rather rational privacy. Users can prove their compliance, asset authenticity, and transaction validity without revealing their identity, positions, or transaction details. It uses a two-state ledger and zero-knowledge proofs to achieve both verifiability and privacy simultaneously.

More importantly, Midnight isn't just a story. Its application scenarios include institutional DeFi, large-scale transactions, RWA, on-chain identity, medical data, and enterprise collaboration—any scenario requiring on-chain data but fearing information leakage is its primary battleground. The NIGHT + DUST design separates token value from usage costs, making privacy computing truly commercially viable.

The AAVE incident illustrates one point: the most expensive thing on-chain isn't gas, but the fact that your asset information is seen by everyone in advance. Midnight aims to solve what Web3 must do to move towards commercialization. It's not just another privacy chain; it's more like a future privacy operating system for Web3.

#night $NIGHT
Mars Finance
Mars Finance
Crypto Newbie
03-16 09:34
🔔Venus Releases Preliminary Analysis of Hacking Attack Methods and Reduces Collateral Factor to 0 in 7 Markets Mars Finance reports that on March 16th, Venus Protocol released an update on the abnormal activity in the THE liquidity pool. In addition to previously suspending THE lending and withdrawals, the collateral factor (CF) in seven markets has been reduced to 0. This preventative measure targets markets where a single user holds an excessively high proportion of collateral. The seven markets are BCH, LTC, UNI, AAVE, FIL, TWT, and LISUSD. All other markets remain unaffected and continue normal operations. The preliminary assessment of the attack method indicates that the attacker began slowly accumulating THE tokens through normal deposit processes starting in June 2025, eventually holding 84% of the maximum limit (approximately 12.2 million THE tokens). Yesterday, the hacker directly transferred THE tokens into the protocol contract, instantly boosting the supply and creating a massive amount of collateral. The hackers then engaged in recursive price manipulation, exploiting the extremely low liquidity of THE on-chain coupled with TWAP oracle delays. The cycle involved depositing THE, lending out other assets, using the lent assets to buy more THE on-chain, and waiting for the TWAP oracle to update and drive up the price. Venus stated that it remains committed to transparency and will release a full report after the investigation concludes.
🔔Venus Releases Preliminary Analysis of Hacking Attack Methods and Reduces Collateral Factor to 0 in 7 Markets

Mars Finance reports that on March 16th, Venus Protocol released an update on the abnormal activity in the THE liquidity pool. In addition to previously suspending THE lending and withdrawals, the collateral factor (CF) in seven markets has been reduced to 0. This preventative measure targets markets where a single user holds an excessively high proportion of collateral. The seven markets are BCH, LTC, UNI, AAVE, FIL, TWT, and LISUSD. All other markets remain unaffected and continue normal operations. The preliminary assessment of the attack method indicates that the attacker began slowly accumulating THE tokens through normal deposit processes starting in June 2025, eventually holding 84% of the maximum limit (approximately 12.2 million THE tokens). Yesterday, the hacker directly transferred THE tokens into the protocol contract, instantly boosting the supply and creating a massive amount of collateral. The hackers then engaged in recursive price manipulation, exploiting the extremely low liquidity of THE on-chain coupled with TWAP oracle delays. The cycle involved depositing THE, lending out other assets, using the lent assets to buy more THE on-chain, and waiting for the TWAP oracle to update and drive up the price. Venus stated that it remains committed to transparency and will release a full report after the investigation concludes.