3DBenchy Enters the Public Domain
“3DBenchy, a 3D model [of an adorable little boat] designed specifically for testing and benchmarking 3D printers, is now in the public domain.”
Originally released on April 9, 2015, by Creative Tools, the model has become a beloved icon of the 3D printing community. […] NTI has decided to release 3DBenchy to the world by making it public domain, marking its 10th anniversary with this significant gesture.
Mark your calendars for April 9, 2025, as 3DBenchy celebrates its 10th anniversary! A special surprise is planned for the 3DBenchy community to commemorate this milestone.
(Via Alan Butler)
Tags: 3dbenchy 3d-printing via:alan-butler ip public-domain creative-commons
Justin's Linklog Posts
-
These are very cool — drawings of the vèvè, the symbology used in Haitian Vodou.
“Vodou, a [Haitian] spiritual and cultural practice that has long intrigued people from around the world, is a fascinating blend of African, Native American, and European beliefs and traditions. It’s a rich tapestry woven from the beliefs and experiences of enslaved peoples brought to the Caribbean and the Americas, and it has been shaped and evolved over centuries to become what it is today.”
(via Minor Mobius, https://bsky.app/profile/minormobius.bsky.social/post/3lhzvuovycs2a )
Tags: via:minormobius sigils veve haiti caribbean religion art graphics signs symbology
-
This is great — Monzo built “Monzo Stand-in”, a full “backup” of the main stack, since uptime is critical to them:
We take reliability seriously at Monzo so we built a completely separate backup banking infrastructure called Monzo Stand-in to add another layer of defence so customers can continue to use important services provided by us. We consider Monzo Stand-in to be a backup of last resort, not our primary mechanism of providing a reliable service to our customers, by providing us with an extra line of defence.
Monzo Stand-in is an independent set of systems that run on Google Cloud Platform (GCP) and is able to take over from our Primary Platform, which runs in Amazon Web Services (AWS), in the event of a major incident. It supports the most important features of Monzo like spending on cards, withdrawing cash, sending and receiving bank transfers, checking account balances and transactions, and freezing or unfreezing cards.
Flashback to the old Pimms setup in AWS Network Monitoring; we had an entire duplicate stack in AWS — every single piece duplicated and running independently.
Tags: architecture uptime monzo banking reliability ops via:itc
-
Very cool trick from Tony Finch; using the PCG random number generator, AVX or NEON vector instructions on modern CPUs allow generation of multiple RNG states at once, in parallel
Tags: rngs avx neon vector-instructions cpu parallelism pcg random randomness hacks
Language Models Do Addition Using Helices
wtf:
Mathematical reasoning is an increasingly important indicator of large language model (LLM) capabilities, yet we lack understanding of how LLMs process even simple mathematical tasks. To address this, we reverse engineer how three mid-sized LLMs compute addition. We first discover that numbers are represented in these LLMs as a generalized helix, which is strongly causally implicated for the tasks of addition and subtraction, and is also causally relevant for integer division, multiplication, and modular arithmetic. We then propose that LLMs compute addition by manipulating this generalized helix using the “Clock” algorithm: to solve a+b, the helices for a and b are manipulated to produce the a+b answer helix which is then read out to model logits. We model influential MLP outputs, attention head outputs, and even individual neuron preactivations with these helices and verify our understanding with causal interventions. By demonstrating that LLMs represent numbers on a helix and manipulate this helix to perform addition, we present the first representation-level explanation of an LLM’s mathematical capability.
Tags: llms helices trigonometry magic weird ai papers arithmetic addition subtraction
Critical Ignoring as a Core Competence for Digital Citizens
“Critical ignoring” as a strategy to control and immunize one’s information environment (Kozyreva et al., 2023):
Low-quality and misleading information online can hijack people’s attention, often by evoking curiosity, outrage, or anger. Resisting certain types of information and actors online requires people to adopt new mental habits that help them avoid being tempted by attention-grabbing and potentially harmful content.
We argue that digital information literacy must include the competence of critical ignoring—choosing what to ignore and where to invest one’s limited attentional capacities. We review three types of cognitive strategies for implementing critical ignoring:
- self-nudging, in which one ignores temptations by removing them from one’s digital environments;
- lateral reading, in which one vets information by leaving the source and verifying its credibility elsewhere online;
- and the do-not-feed-the-trolls heuristic, which advises one to not reward malicious actors with attention.
We argue that these strategies implementing critical ignoring should be part of school curricula on digital information literacy.
Good to give names to these practices, since we’re all having to do them nowadays anyway…
(Via Stan Carey)
Tags: psychology trolls media kids internet literacy attention critical-ignoring ignoring papers via:stancarey
-
“Carbon-aware infrastructure to optimize your CI/CD workflows” — “A multi-cloud CI/CD Github Actions Runner that shifts your workflows to the lowest CO2 regions. 90% Greener. 25% Cheaper. 1 line of code. Zero Effort. ?”
(Via Dryden Williams)
Tags: green sustainability carbon github ci cd workflows development via:climateactiontech
-
It’s Linux, running inside a PDF file.
“The humble PDF file format supports JavaScript – with a limited standard library, mind you. By leveraging this, [vk6] managed to compile a RISC-V emulator (TinyEMU) into JavaScript using an old version of Emscripten targeting asm.js instead of WebAssembly. The emulator, embedded within the PDF, interfaces with virtual input through a keyboard and text box.”
(via Fuzzix)
Tags: via:fuzzix linux pdf hacks emulation javascript emscripten tinyemu
Undergraduate Upends a 40-Year-Old Data Science Conjecture
This is a great story; bonus that it’s a notable improvement for the humble hash-table data structure:
Krapivin was not held back by the conventional wisdom for the simple reason that he was unaware of it. “I did this without knowing about Yao’s conjecture,” he said. His explorations with tiny pointers led to a new kind of hash table — one that did not rely on uniform probing. And for this new hash table, the time required for worst-case queries and insertions is proportional to (log x)^2 — far faster than x. This result directly contradicted Yao’s conjecture. Farach-Colton and Kuszmaul helped Krapivin show that (log x)^2 is the optimal, unbeatable bound for the popular class of hash tables Yao had written about.
Paper here — https://arxiv.org/abs/2501.02305 .
Tags: data-structures hash-tables cs programming coding papers optimization open-addressing
-
This is great to see:
Common Corpus is the largest open and permissible licensed text dataset, comprising 2 trillion tokens (1,998,647,168,282 tokens). It is a diverse dataset, consisting of books, newspapers, scientific articles, government and legal documents, code, and more. Common Corpus has been created by Pleias in association with several partners and contributed in-kind to Current AI initiative.
The dataset in its entirety meets the requirements of the Code of Conduct of the AI Act and goes further than the current requirements for data transparency. It aims to set a new standard of openness in AI, showing that detailed provenance at a granular document level is a realistic objective, even at the scale of 2 trillion tokens.
Tags: ai llms open-data open-source pleias common-corpus corpora training ai-act
Government agency removes spoon emoji from work platform amid protests
lol. “On Wednesday, employees at the Technology Transformation Services division of the [U.S. government’s General Services Administration] reportedly unleashed a torrent of spoon emojis in the chat that accompanied an organization-wide, 600-person video conference with new leader Thomas Shedd, a former Tesla engineer.” … Workers embraced the digital cutlery to protest the Trump administration’s “Fork in the Road” resignation offer.”
-
This is very interesting, on the applicability and usefulness of generative AI, given their inherent error rate and probabilistic operation:
Asking if an LLM can do very specific and precise information retrieval might be like asking if an Apple II can match the uptime of a mainframe, or asking if you can build Photoshop inside Netscape. No, they can’t really do that, but that’s not the point and doesn’t mean they’re useless. They do something else, and that ‘something else’ matters more and pulls in all of the investment, innovation and company creation. Maybe, 20 years later, they can do the old thing too – maybe you can run a bank on PCs and build graphics software in a browser, eventually – but that’s not what matters at the beginning. They unlock something else.
What is that ‘something else’ for generative AI, though? How do you think conceptually about places where that error rate is a feature, not a bug?
(Via James Tindall)
Tags: errors probabilistic computing ai genai llms via:james-tindall
-
The UK’s new Online Safety Act law is extremely vague, extremely punitive, and has Fediverse operators Woof.group very worried —
Ofcom carefully avoided answering almost all of our questions. They declined to say whether ~185 users was a “significant number”. Several other participants in Ofcom’s livestreams also asked what a significant number meant. Every time, Ofcom responded obliquely: there are no numeric thresholds, a significant number could be “small”, Ofcom could target “a one-man band”, and providers are expected to have a robust justification for deciding they do not have a significant number of UK users. It is unclear how anyone could make a robust justification given this nebulous guidance. In their letter, Ofcom also declined to say whether non-commercial services have target markets, or whether pornography poses a “material risk of significant harm”. In short, we have no answer as to whether Woof.group or other Fediverse instances are likely to fall in scope of the OSA.
Do we block pre-emptively, or if and when Ofcom asks? This is the ethical question Woof.group’s team, like other community forums, have been wrestling with. Ofcom would certainly like sites to take action immediately. As Hoskings warned:
“Don’t wait until it’s too late. That’s the message. Once you do get the breach letter, that is when it is too late. The time doesn’t start ticking from then. The time is ticking from—for part five services, from January, part three from July.”
Tags: woof.group fediverse mastodon social-media uk osa laws ofcom porn blocking
Building Materials Price Tracker
Graphs tracking the cost of building materials in Ireland; turns out these are a prime driver of construction costs here, so this is good info to have when planning construction work…
Tags: building-materials construction costs ireland prices building
Apple Ordered by UK to Create Global iCloud Encryption Backdoor
The British government has secretly demanded that Apple give it blanket access to all encrypted user content uploaded to the cloud, reports The Washington Post.
The spying order came by way of a “technical capability notice,” a document sent to Apple by the Home Secretary, ordering it to provide access under the sweeping UK Investigatory Powers Act (IPA) of 2016. Critics have labeled the legislation the “Snooper’s Charter,” as it authorizes law enforcement to compel assistance from companies when needed to collect evidence.
Apple is likely to stop offering encrypted storage in the UK, rather than break the security promises it made to its users, people familiar with the matter told the publication. However, that would not affect the UK order for backdoor access to the service in other countries, including the United States. Apple has previously said it would consider pulling services such as FaceTime and iMessage from the UK rather than compromise future security.
(via gwire)
Tags: via:gwire apple encryption backups cloud ipa surveillance icloud backdoors security infosec
Within Bounds: Limiting AI’s environmental impact
A joint statement issued by the Green Screen Coalition, the Green Web Foundation, Beyond Fossil Fuels, Aspiration, and the critical infrastructure lab, regarding AI’s impact on climate change:
To meet the challenge of climate change, environmental degradation, pollution and biodiversity loss, and its attendant injustices, we urge policymakers, industry leaders and all stakeholders to acknowledge the true environmental costs of AI, to phase out fossil fuels throughout the technology supply chain, to reject false solutions, and to dedicate all necessary means to bring AI systems in line with planetary boundaries. Meeting these demands is an essential step to ensure that AI is not driving further planetary degradation and could instead support a sustainable and equitable transition.
Their demands are:
- I. PHASE OUT FOSSIL FUELS
- II. COMPUTING WITHIN LIMITS
- III. RESPONSIBLE SUPPLY CHAINS
- IV. EQUITABLE PARTICIPATION
- V. TRANSPARENCY
Tags: via:climateaction climate climate-change ai fossil-fuels sustainability
-
“Live Search / ELK on the Lake”:
Same ELK tools, but the scalability, cost effectiveness & durability of the lake, powered by ChaosSearch.
Recommended for log search by Corey Quinn, pricing looks reasonable too.
Tags: search elk kibana chaossearch logs data-lake ops via:cquinn
-
via Ben Schaechter: “a new microsite we’ve launched for the AWS community that helps with understanding billing codes present in either Cost Explorer or the CUR. We profiled the number of distinct billing codes across our customer base and have about ~60k unique billing codes. We hear all the time that FinOps practitioners and engineers are confused about the billing codes present in Cost Explorer or the Cost and Usage Report. Think of these as being things like “Requests-Tier1” for S3 or “CW:GMWI-Metrics” for CloudWatch. There is usually really limited resources for determining what these billing codes are even when you Google around for them.”
Words from an ex-Zizian-adjacent person
It seems there’s now a full-on Mansonesque death cult emerging from the LessWrong/rationalist/effective-altruism community: https://www.sfgate.com/bayarea/article/bay-area-death-cult-zizian-murders-20064333.php
This HN comment was very interesting for background:
[Former member of that world, roommates with one of Ziz’s friends for a while, so I feel reasonably qualified to speak on this.] The problem with rationalists/EA as a group has never been the rationality, but the people practicing it and the cultural norms they endorse as a community.
As relevant here:
1) While following logical threads to their conclusions is a useful exercise, each logical step often involves some degree of rounding or unknown-unknowns. A -> B and B -> C means A -> C in a formal sense, but A -almostcertainly-> B and B -almostcertainly-> C does not mean A -almostcertainly-> C. Rationalists, by tending to overly formalist approaches, tend to lose the thread of the messiness of the real world and follow these lossy implications as though they are lossless. That leads to…
2) Precision errors in utility calculations that are numerically-unstable. Any small chance of harm times infinity equals infinity. This framing shows up a lot in the context of AI risk, but it works in other settings too: infinity times a speck of dust in your eye >>> 1 times murder, so murder is “justified” to prevent a speck of dust in the eye of eternity. When the thing you’re trying to create is infinitely good or the thing you’re trying to prevent is infinitely bad, anything is justified to bring it about/prevent it respectively.
3) Its leadership – or some of it, anyway – is extremely egotistical and borderline cult-like to begin with. I think even people who like e.g. Eliezer [Yudkowsky] would agree that he is not a humble man by any stretch of the imagination (the guy makes Neil deGrasse Tyson look like a monk). They have, in the past, responded to criticism with statements to the effect of “anyone who would criticize us for any reason is a bad person who is lying to cause us harm”. That kind of framing can’t help but get culty.
4) The nature of being a “freethinker” is that you’re at the mercy of your own neural circuitry. If there is a feedback loop in your brain, you’ll get stuck in it, because there’s no external “drag” or forcing functions to pull you back to reality. That can lead you to be a genius who sees what others cannot. It can also lead you into schizophrenia really easily. So you’ve got a culty environment that is particularly susceptible to internally-consistent madness, and finally:
5) It’s a bunch of very weird people who have nowhere else they feel at home. I totally get this. I’d never felt like I was in a room with people so like me, and ripping myself away from that world was not easy. (There’s some folks down the thread wondering why trans people are overrepresented in this particular group: well, take your standard weird nerd, and then make two-thirds of the world hate your guts more than anything else, you might be pretty vulnerable to whoever will give you the time of day, too.)
TLDR: isolation, very strong in-group defenses, logical “doctrine” that is formally valid and leaks in hard-to-notice ways, apocalyptic utility-scale, and being a very appealing environment for the kind of person who goes super nuts -> pretty much perfect conditions for a cult. Or multiple cults, really. Ziz’s group is only one of several.
Tags: zizians cults extropianism tescreal effective-altruism rationalism lesswrong death-cults
-
an algorithm used to prepare data for use with data compression techniques such as bzip2. It permutes the order of characters in a string (S), sorting all the circular shifts of the text in lexicographic order, then extracting the last column and the index of the original string in the set of sorted permutations of S.
Some day when I have lots of free time to spare, I’ll spend a while getting my head around this deep magic, because it’s just amazing that this works.
(via John Regehr)
Tags: compression algorithms burrows-wheeler-transform bzip2 via:john-regehr magic text
-
This is fantastic — a newly-discovered species of fungus does the same trick as Ophiocordyceps in Brazil; it infects the brains of orb-weaving cave spiders in Ireland, and induces them to leave their lairs or webs, and migrate to die in an exposed situation, in order to favor dispersal of the fungal spores.
Ophiocordyceps is, of course, the inspiration for the zombie-forming fungus in The Last Of Us.
Tags: cordyceps fungi ireland spiders zombies fungus nature gross
The Billion Docs JSON Challenge: ClickHouse vs. MongoDB, Elasticsearch, and more
This buries the lede somewhat, but here’s the key bit:
We built a new powerful JSON data type for ClickHouse with true column-oriented storage, support for dynamically changing data structures without type unification and the ability to query individual JSON paths really fast. […] ClickHouse stores the values of each unique JSON path as native columns, allowing high data compression and, as we are demonstrating in this blog, maintaining the same high query performance seen on classic types.
The performance results are very impressive, and notably also efficient in disk space usage.
Tags: clickhouse benchmarks performance json querying columnar-storage mongodb elasticsearch databases storage
-
The moon may have a timezone of its own soon, Coordinated Lunar Time (LTC):
Due to the moon’s lower gravity and its motion relative to Earth, moon time passes 56 microseconds faster each earth day. As a result, an atomic clock on Earth would run at a different rate than an atomic clock on the moon.
Similar to how UTC is determined, the memo suggests “an ensemble of clocks” deployed to the moon might be used to set the new time standard.
(via David Cuthbert)
Tags: via:david-cuthbert moon time timezones ltc
Understanding the BM25 full text search algorithm
“BM25, or Best Match 25, is a widely used algorithm for full text search. It is the default in Lucene/Elasticsearch and SQLite, among others.” At its heart, it’s an interesting probabilistic ranking scheme, involving the Inverse Document Frequency of a term, term frequency in a single document, and the document length. (Via Tony Finch)
Tags: via:fanf lucene elasticsearch search text algorithms sqlite full-text bm25
LLM-Driven Code Completion in JetBrains IDEs
JetBrains have come up with a new relatively-lightweight LLM-driven code generation option, constrained to producing single line suggestions:
The length of the completion suggestions is a trade-off. While longer suggestions do tend to reduce how many keystrokes you have to make, which is good, they also increase the number of reviews required on your end. Taking the above into account, we decided that completing a single line of code would be a fair compromise.
Some key features:
-
It works locally and is available offline. This means you can take advantage of the feature even if you aren’t connected to the internet.
-
It doesn’t send any data from your machine over the internet. The language models that power full line code completion run locally, which is great for two reasons. First, your code remains safe, as it never leaves your machine. Second, there are no additional cloud-related expenses – that’s why this feature comes at no additional cost.
Also, customer code is never used for training.
I’ve used this (in RubyMine), and found it fairly useful; it’s good for generating the obvious next line, but is easily ignored when that’s not what’s needed. Not bad at all.
Tags: coding code-completion jetbrains ides java ruby llms ai code-generation rubymine intellij
-
-
Crazy stuff. Elite, ported to the Commodore VIC 20 (albeit with a 32K expansion):
VIC 20 Elite is based on the C-64 source. VIC 20 specific graphics, text, keyboard & joystick input, and sound routines were written from scratch to replace the corresponding C-64 code.
Of course, the complete enhanced Elite won’t fit within the VIC 20’s limited memory, so some features had to be left out. Following the original 1984 BBC Cassette and Acorn Electron version, the VIC 20 version omits extended planet descriptions, planetary details (craters and meridians), and the missions that appear further on in the game. The pause mode options are dropped, and there is no Find Planet option in Galactic Chart (that would be only really useful during missions).
(via Sleepy from FP)
Tags: retrogaming commodore emulation gaming history elite vic-20
-
“a Go heap object reference analysis tool based on delve: It can display the space and object count distribution of Go memory references, which is helpful for efficiently locating memory leak issues or viewing persistent heap objects to optimize the garbage collector (GC) overhead.”
Nice to see Go supporting similar debugging/optimisation tools to those offered by the JVM.
Tags: go heap memory gc memory-leaks
Artsy’s Technology Choices evaluation process
This is a nice way to evaluate new technology options, from Artsy:
We want to accomplish a lot with a lean team, which means we must choose stable technologies. However, we also want to adopt best-of-breed technologies or best-suited tools, which may need work or still be evolving. We’ve borrowed from ThoughtWorks’ Radar to define the following stages for evaluating, adopting, and retiring technologies:
- Adopt: Reasonable defaults for most work. These choices have been exercised successfully in production at Artsy and there is a critical mass of engineers comfortable working with them.
- Trial: These technologies are being evaluated in limited production circumstances. We don’t have enough production experience to recommend them for high-risk or business-critical use cases, but they may be worth consideration if your project seems like a fit.
- Assess: Technologies we are interested in and maybe even built proofs-of-concept for, but haven’t yet trialed in production.
- Hold: Based on our experience, these technologies should be avoided. We’ve found them to be flawed, immature, or simply supplanted by better alternatives. In some cases these remain in legacy production uses, but we should take every opportunity to retire or migrate away.
(Via Lar Van Der Jagt on the Last Week In AWS slack instance)
Tags: via:lwia tech technology radar choices evaluation process architecture planning tools
-
Some good thoughts from a SlateDB dev, regarding initial principles for errors in SlateDB, derived from experience with Kafka:
- Keep public errors separate from internal errors. The set of public errors should be kept minimal and new errors should be highly scrutinized. For internal errors, we can go to town since they can be refactored and consolidated over time without affecting the user.
- Public errors should be prescriptive. Can an operation be retried? Is the database left in an inconsistent state? Can a transaction be aborted? What should the user actually do when the error is encountered? The error should have clear guidance.
- Prefer coarse error types with rich error messages. There are probably hundreds of cases where the database can enter an invalid state. We don’t need a separate type for each of them. We can use a single FatalError and pack as much information into the error message as is necessary to diagnose the root cause.
(via Chris Riccomini)
Tags: errors api design slatedb api-design error-handling exceptions architecture
7 Lessons from building a small-scale AI application
These are good. tl;dr:
- AI programming is stochastic;
- Data quality is real work;
- Models are only as good as the evaluation;
- Trust/Quality is the #1 issue;
- Your training pipeline is your core IP;
- AI is yet another distributed system;
- Don’t buy the AI library hype
via Niall Murphy.
Optimizing Java Apps on Kubernetes
“Optimizing Java Applications on Kubernetes: beyond the Basics”: Bruno Borges, at the InfoQ Dev Summit Boston, discusses the strategies for enhancing Java application performance on Kubernetes, focusing on leveraging JVM ergonomics, and managing garbage collection processes. Some interesting tips here.
Tags: kubernetes java eks resources ops scaling scalability gc optimization jvm
-
Bookmarking this in case I have to use it; I have a blog-related use case that I don’t want LLM scrapers to kill my blog with.
Anubis is a man-in-the-middle HTTP proxy that requires clients to either solve or have solved a proof-of-work challenge before they can access the site. This is a very simple way to block the most common AI scrapers because they are not able to execute JavaScript to solve the challenge. The scrapers that can execute JavaScript usually don’t support the modern JavaScript features that Anubis requires. In case a scraper is dedicated enough to solve the challenge, Anubis lets them through because at that point they are functionally a browser.
The most hilarious part about how Anubis is implemented is that it triggers challenges for every request with a User-Agent containing “Mozilla”. Nearly all AI scrapers (and browsers) use a User-Agent string that includes “Mozilla” in it. This means that Anubis is able to block nearly all AI scrapers without any configuration.
Tags: throttling robots scraping ops llms bots hashcash tarpits
Cost-optimized archival in S3 using s3tar
“s3tar” is new to me, and looks like a perfect tool for this common use-case — aggregation and archival of existing data on S3, which often requires aggregation into large file sizes to take advantage of S3 Glacier storage classes (which have a minimum file size of 128Kb).
s3tar optimizes for cost and performance on the steps involved in downloading the objects, aggregating them into a tar, and putting the final tar in a specified Amazon S3 storage class using a configurable “–concat-in-memory” flag. … The tool also offers the flexibility to upload directly to a user’s preferred storage class or store the tar object in S3 Standard storage and seamlessly transition it to specific archival classes using S3 Lifecycle policies.
The only downside of s3tar is that it doesn’t support recompression, which is also a common enough requirement — especially after aggregation of multiple small input files into a larger, more compressible archive. But hey, can’t have everything.
s3tar: https://github.com/awslabs/amazon-s3-tar-tool
Tags: s3tar amazon s3 compression storage archival architecture aggregation logs glacier via:lwia
-
It’s great to see pushback against React, Angular, and other SPA architectures for web app delivery. I never got my head around the applicability of these for many web app use cases so this is just confirming my biases :)
Related Mastodon thread: https://toot.cafe/@slightlyoff/113868445222841008
Tags: react angular spa web-apps webdev javascript html apps
-
Since 2019 (!), the AWS load balancer controller component doesn’t safely handle pod shutdowns when the ALB target-type is set to
ip
. This is the bug report, still open…Tags: aws load-balancing alb eks kubernetes ops bugs
Cryptocurrency “market caps” and notional value
Excellent explainer from Molly White, which explains the risk around quoting “market caps” for memecoins:
The “market cap” measurement has become ubiquitous within and outside of crypto, and it is almost always taken at face value. Thoughtful readers might see such headlines and ask questions like “how did a ‘$2 trillion market’ tumble without impacting traditional finance?”, but I suspect most accept the number.
When crypto projects are hacked, there are headlines about hackers stealing “$166 million worth” of tokens, when in reality the hackers only could cash out 2% of that amount (around $3 million) because their attempts to sell illiquid tokens caused the price to crash.
Tags: molly-white memecoins bitcoin rug-pulls scams liquidity market-caps cryptocurrency