Home > NEWS > Infura is to blame for MetaMask’s violation of the crypto spirit

Infura is to blame for MetaMask’s violation of the crypto spirit

ConsenSys announced in November that Infura, MetaMask’s API provider, was collecting wallet and IP addresses from MetaMask’s users.

Curbing censorship is a prerequisite for data encryption, so for many digital currency simplex, Consensys, based in New York, announced on November 23rd that it would collect the details of his IP and wallet address, which is actually against the spirit of data encryption. Consensys is the driving force behind the leading ethernet browser wallet. Consensys is the leading ethernet computer browser wallet behind it.

In the weeks that followed, Consensys first took action, indicating that the collected data could only be kept for seven days, and then upgraded the MetaMASK role to allow users to choose to leave InFura. However, the problem remains:Have they done enough to build login password defenses?

While many of us may be satisfied with MetaMASK tracking users' wallets and IP addresses, more of us are reluctant because blockchain technology is supposed to be decentralized, allowing people to control their data and finances without any intermediaries such as banks or government departments.

In order to have a healthy life debate, let's say that under some acceptable premises, we can use MetaMASK to track users' wallets and IP addresses. These factors may occur in the case of a hacker attack. The information collected by the InFura agreement is likely to be helpful in identifying the criminals involved.

Perhaps more crucially for Consensys, "agents" may have more to do with official website policies and regulations, such as "know your customer laws", anti-money laundering laws and support for terrorist organizations.

But the reason behind determining whether to "monitor" or terminate the MetaMASK user privacy feature is worrying-and a bit scary-because it clearly violates the spirit of the login password.

Return the right of control and use to the user

The key to the spirit of the login password is to enable people to control their property again, so that they can use the property at will and have the right to use data and information. in this way, he can monetize the information to participate in decentralized economic development, such as the development of the equipment economy.

InFura is an important culprit in violating the spirit of data encryption, tracking the detailed addresses of users'IP and ETH wallets, while suggesting that MetaMaskTM users run a new Ethernet node, or if he is so worried about InFura's invasion, use a different node service provider.

It is assumed that InFura (or any other API service provider) has the user's IP and ETH detailed addresses. In this case, it can quickly find the user's home and combine it with all the ETH assets and chain transactions made by the user. This is really horrible.

A conflicting violation.

This has caused an eye-catching debate in the password world. Despite the frictional resistance to censorship brought about by the Ethernet blockchain technology, the API service provider that InFura provides a full range of Ethernet block links does not have a divergent responsibility to contain censorship.

This can be very risky for users of MetaMASK or any other wallet because it makes them vulnerable to censorship without prior notice or warning.

Then there is AlChemy and MyEtherWallet, who try to "use the anxiety of MetaMASK users to make money", only to find two solutions to data-encrypted wallets that also track users' databases.

Indeed, anyone can push BTC (BTC) to others-even if police officers or government departments do not approve it. But if BTC does not resist censorship, such governments may take away or block BTC. Crypto is to be established with full consideration of curbing censorship, as long as we must and cherish our own privacy.

It's also ironic. Blockchain developers take great pains to design the chain to be anti-censorship. However, the API node service provider "hijacked" its original intention and quietly influenced it, and for a long time, the hidden victim-- the user-- was not told of this change.

Because InFura violates the "login password spirit", there are two reference standards.

Login password enthusiasts should once again supervise the API service provider and notify the community if their personal behavior is irresponsible.

  • Volkswagen's regulation is necessary, as the two whistleblowers did according to his Twitter account.
  • MetaMASK and other wallets must immediately notify the user and respond to his privacy policy. For example, he should tell users that they are using InFura, which simply cannot guarantee his privacy at all. It can be said that in November, this was not done properly and was not done in the form of adequate publicity.
  • The creator of a decentralized application process (Dapp) should be responsible for notifying people that the API nodes used are not secure or resistant to censorship in order to raise awareness.

Which type of technology can solve this problem well?

  • The API node as a service makes it easy for a non-technical user to run the API node for his wallet. This should be as easy as buying VPN service projects for both users and developers.
  • At the mathematical level, I always believe. Technicality has always meant that people fight for freedom. Vitalic Butlin, founder of Etherum, recently released an imperfect hidden detailed address manual that does not use new technologies. However, if implemented on Etherum, they will deal with some of the privacy violations raised by InFura. People can still use InFura to accurately locate users' homes, butNot his chain business or property.
Chai Lilunis the co-founder and CEO of IoTeX. He previously worked for companies including Google, Uber and Oracle. He holds a Ph.D. from the University of Waterloo, where his research focused on designing and analyzing lightweight ciphers and authentication protocols for the Internet of Things. At Google, he led security initiatives for its technical infrastructure, including the mitigation of SSL attacks, privacy-preserving SSL offloading and enabling certificate transparency for all Google services. He was also the founding engineer of Google Cloud Load Balancer.
by wjb news
© 2023 WJB All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

Why can Bitcoin make money? Is Bitcoin's fixed investment profitable?

For some newcomers to the currency circle, they are not familiar with the investment in the currency circle, and their understanding of the special currency is not very deep. Therefore, they may be at a loss in the choice of investment methods. Many inves

VIDEO

NEWS

Tue, 18 Apr 2023

More