Arsablog

UniSwap has blocked 253 wallet addresses linked to illegal activities

uniswap-blocks-addressesبلاک کردن آدرس‌های مشکوک توسط یونی سواپ

UniSwap has blocked 253 wallet addresses, according to information recently posted on GitHub. This is the first time that Uniswap has shared information about the details of blocking addresses and its blocking method.

According to Mihan Blockchain and quoted by The Block, the UniSwap decentralized exchange has blocked 253 crypto addresses within 4 months of cooperation with the blockchain analysis company TRM Labs.

This is the first time that UniSwap has announced information related to blocking and blacklisting of addresses.

These addresses are mostly blocked due to being related to stolen funds or transactions of mixing services such as TornadoCash. It should be mentioned that Tornadokesh has recently been sanctioned by the US Treasury Department.

According to Yearn Finance lead developer Banteg, this Information Published on GitHub by UniSwap Software Engineer Jordan Frankfurt. Frankfurt stated that UniSwap consists of three main parts:

The code available on the Ethereum blockchain platform that everyone can communicate with. A front-end website that provides a way for users to interact with the code, and a US-based company that develops the UniSwap protocol and operates the website. Blocking crypto addresses is done at the front-end level.

UniSwap has started its cooperation with TRM Labs since April. When users interact with the Uniswap website, their URL is sent to TRM Labs. TRM Labs then assigns a risk level to each address. From this point onwards, UniSwap must decide which risk levels are safe and dangerous.

According to Frankfort’s comments on GitHub, Uniswap initially blocked addresses that were indirectly linked to the sanctioned addresses, but then reduced the scope of its blocking. Currently, UniSwap only blocks addresses that have been banned or have directly received stolen or hacked funds.

According to a diagram published on GitHub, TRM Labs checks addresses based on 7 types of illegal activity. The four main types of stolen funds include funds received from Mixer Services transactions, banned addresses, and funds associated with known scams. The other three categories include those related to child sexual abuse, funds from known hacker groups, and funds used to finance terrorism.

In this regard, Banteg has noted that 30 of the mentioned addresses are related to the Ethereum Name Service (ENS). ENS names are human readable names and are used to send crypto payments to wallets more easily. Most of these addresses were probably legitimate users, Banteg said.

source

Leave a Reply

Your email address will not be published.