The Euler attacker is negotiating with Euler for the return of funds and wants to set up secure communication

On March 21st, a Euler Finance attacker commented in a transaction sent to Euler early this morning, “We want to make it easy for all affected people to respond. We unintentionally keep things that don’t belong to us. Set up secure communication. Let’s reach an agreement.”

The Euler attacker is negotiating with Euler for the return of funds and wants to set up secure communication

Interpretation of this information:

The message from the Euler Finance attacker appears to be an attempt to negotiate with the company in order to return assets that were taken unintentionally. The attacker seems to imply that there are people who have been affected and that they want to make it easy for these individuals to respond. The attacker also mentions that they have kept things that do not belong to them, suggesting that they may have taken more assets than intended.

The use of the phrase “set up secure communication” indicates that the attacker wants to establish a safe and private means of communication in order to negotiate an agreement with Euler Finance. The attacker seems to be proposing a deal that would result in the return of the assets taken, with the implication that this would benefit both sides.

It is unclear what prompted the attacker to make this statement, as there is no information about previous communication or negotiations between the two parties. It is also unclear what specific assets were taken, or how many people were affected.

Overall, the message from the Euler Finance attacker appears to be an attempt at negotiation and reconciliation, with the goal of returning assets that were taken unintentionally. The use of the phrase “let’s reach an agreement” suggests that the attacker is open to negotiation and compromise.

This article and pictures are from the Internet and do not represent 96Coin's position. If you infringe, please contact us to delete:https://www.96coin.com/44928.html

It is strongly recommended that you study, review, analyze and verify the content independently, use the relevant data and content carefully, and bear all risks arising therefrom.