Crypto Exchange Says It Can't Repay $190 Million to Clients

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • liftsiron
    Administrator
    • Nov 2003
    • 18444

    Crypto Exchange Says It Can't Repay $190 Million to Clients

    News
    Crypto Exchange Says It Can't Repay $190 Million to Clients After Founder Dies With Only Password
    Tom McKay
    Sunday 6:50pmFiled to: Crypto



    Canadian crypto exchange QuadrigaCX says it cannot repay most of $190 million in client holdings after its 30-year-old founder Gerald Cotten, the only person who knew the passwords to its “cold storage,” unexpectedly died in India in December 2018, Coindesk reported on Friday.

    In a sworn affidavit with the Nova Scotia Supreme Court, widow Jennifer Robertson said that QuadrigaCX owes its customers some $190 million in both cryptocurrency and fiat money. QuadrigaCX has filed for creditor protection because it says it cannot access the funds stored in “cold storage,” just the comparatively smaller amount in a “hot wallet” used for transfers, CoinDesk wrote:

    The exchange holds roughly 26,500 bitcoin ($92.3 million USD), 11,000 bitcoin cash ($1.3 million), 11,000 bitcoin cash SV ($707,000), 35,000 bitcoin gold ($352,000), nearly 200,000 litecoin ($6.5 million) and about 430,000 ether ($46 million), totaling $147 million, according to the affidavit.

    It was not clear what portion of the exchange’s crypto holding were kept in cold storage, versus its hot wallet. In the affidavit, Robertson explained that “only a minimal amount of coins” were stored in the hot wallet, but specifics were not provided.

    Robertson also said that Cotten held “sole responsibility for handling the funds and coins” and no other members of the team could access the stored funds. QuadrigaCX announced Cotten’s death in mid-January, saying he had died “due to complications with Crohn’s disease on December 9, 2018 while travelling in India, where he was opening an orphanage to provide a home and safe refuge for children in need.”

    While Robertson has Cotten’s laptop in her possession, CoinDesk wrote, she says she does not know the password, and a technical expert recruited by the firm has been unable to bypass its encryption. She also says Cotten left behind no business records.

    Some other reporting has suggested it is possible some of the funds in question moved after the case was publicized, and though the evidence was not definitive, it and the strange circumstances of Cotten’s death spurred accusations that his demise was either faked or the pretext for an exit scam by other parties with access to the holdings, according to CCN. However, Robertson included a death certificate in the filings, CoinDesk wrote.

    According to CBC, the government confirmed a Canadian had died in India, but could not offer more details due to privacy laws.

    As CBC noted, the Canadian Imperial Bank of Commerce froze $26 millions worth of QuadrigaCX’s assets in January 2018 “after finding irregularities with payment processing,” and a document from the Ontario Superior Court of Justice in 2018 concluded that “$67-million worth of transactions ended up improperly transferred into the personal account of Costodian Inc, the payment processor.” The issue was resolved, though according to CoinDesk, QuadrigaCX says the legal fight as well as ongoing issues with payment processors has “severely compromised” their ability to access tens of millions of dollars’ worth of holdings held by the processors.

    A 2017 Wall Street Journal article noted that unlike stock exchanges, which only facilitate transactions, crypto exchanges are uniquely vulnerable because they store cryptocurrencies for their customers. However, typically the threats associated with this practice are hackers and other cybercriminals, rather than lost passwords.

    In the filings, Robertson wrote that the exchange “urgently needs a stay of proceedings which will allow Quadriga and its contractors additional time to find whatever stores of cryptocurrency may be available and also to negotiate the bank drafts available to Quadriga,” CoinDesk wrote.

    “This is a tough lesson learned,” Calgary customer Elvis Cavalic told CBC, adding that he had been unable to withdraw $15,000 in holdings in October 2018.

    “I would probably avoid [cryptocurrency] in the future,” Cavalic said. “They’ve left us completely in the dark. I’m kind of preparing for the worst.”
    ADMIN/OWNER@Peak-Muscle
  • Deadwood
    VET
    • Dec 2018
    • 145

    #2
    Hmmm. Fake your death and steal the untraceable currency maybe?

    Comment

    • A1food4u

      #3
      Does this really surprise anybody???? money you can't touch or see disappearing....

      Comment

      • Dakota
        VET
        • Feb 2017
        • 1991

        #4
        If they have his laptop they can in all likelyhood pull up the password.

        Every keystroke on your computer leaves a kind of foot print. I think it is called a hash mark. It is like looking at a footprint in the snow. You can tell what key was hit. I have used a similar software to break into laptops that are guarded by windows. You have to use a Linux operating system disk to boot up the laptop and the software looks at all the footprints. Amazingly easy and fast now. It used to take a couple of different softwares and disks and time. Now one disk and one software does the whole job and for me it worked in less than 10 minutes.
        The older I get the better I used to be.

        Comment

        • Dawgpound_Hank

          #5
          Originally posted by Dakota
          If they have his laptop they can in all likelyhood pull up the password.

          Every keystroke on your computer leaves a kind of foot print. I think it is called a hash mark. It is like looking at a footprint in the snow. You can tell what key was hit. I have used a similar software to break into laptops that are guarded by windows. You have to use a Linux operating system disk to boot up the laptop and the software looks at all the footprints. Amazingly easy and fast now. It used to take a couple of different softwares and disks and time. Now one disk and one software does the whole job and for me it worked in less than 10 minutes.
          Wow that's amazing. Where are the keystroke hashes stored - memory? I've always known about software that can do that with keystrokes WHILE installed, but never after the fact. Interesting.

          Comment

          • Dakota
            VET
            • Feb 2017
            • 1991

            #6
            Originally posted by Dawgpound_Hank
            Wow that's amazing. Where are the keystroke hashes stored - memory? I've always known about software that can do that with keystrokes WHILE installed, but never after the fact. Interesting.
            I have no idea how the footprints are stored or pulled off. I don't actually think it is a matter of "stored" it is more just a trail.

            A keylogger is completely different than what this is.
            The older I get the better I used to be.

            Comment

            • A1food4u

              #7
              Originally posted by Dakota
              If they have his laptop they can in all likelyhood pull up the password.

              Every keystroke on your computer leaves a kind of foot print. I think it is called a hash mark. It is like looking at a footprint in the snow. You can tell what key was hit. I have used a similar software to break into laptops that are guarded by windows. You have to use a Linux operating system disk to boot up the laptop and the software looks at all the footprints. Amazingly easy and fast now. It used to take a couple of different softwares and disks and time. Now one disk and one software does the whole job and for me it worked in less than 10 minutes.
              so someday the world will find out about my donkey clown porn fetish from my key strokes... damn

              Comment

              • 01dragonslayer
                Banned
                • Apr 2018
                • 2343

                #8
                Someone's makin' out.

                Comment

                Working...