Tap to Trade in Gate Square, Win up to 50 GT & Merch!
Click the trading widget in Gate Square content, complete a transaction, and take home 50 GT, Position Experience Vouchers, or exclusive Spring Festival merchandise.
Click the registration link to join
https://www.gate.com/questionnaire/7401
Enter Gate Square daily and click any trading pair or trading card within the content to complete a transaction. The top 10 users by trading volume will win GT, Gate merchandise boxes, position experience vouchers, and more.
The top prize: 50 GT.
.
It is noteworthy that the Gwangju District Prosecutors’ Office has previous experience handling large-scale cryptocurrency seizure cases. As early as March 2024, the office attempted to recover Bitcoin worth about 170 billion Korean won (around 127 million USD) related to an illegal online gambling case. The recent reports of lost assets have raised high public concern over the prosecutor’s ability to securely manage cryptocurrencies.
The first concern from the public is whether the seizure procedures adhered to standard operating protocols. If only hardware devices containing wallet information were seized, without actually transferring the Bitcoin to a custody wallet controlled by the prosecutors, then the original holders could still access the assets if they possess backup private keys.
Secondly, the environment in which the wallets are created is crucial. If the prosecutors set up new custody wallets on “internet-connected computers,” the private keys could be exposed at the moment of generation. According to cybersecurity best practices, cryptocurrency wallets should be created on completely offline, isolated devices to prevent any external intrusion.
Thirdly, how private keys are stored is equally important. Storing private keys on internet-connected devices or in cloud storage essentially opens the door for hackers. A more secure approach is to write the private keys on paper and store them offline in a safe place.
Finally, human factors pose significant risks. Even a brief leak can allow private keys to be copied within seconds. The report mentions that personnel involved may have accidentally visited a phishing website during routine checks, reflecting potential gaps in cybersecurity awareness, operational procedures, and access management within the prosecutors’ office.