Did McAfee Use Storj?
https://storj.io
Video overview:
https://link.dcs1.storjshare.io/s/jxqy2wdbf5qeaxo4a2eq6yw3gthq/videos/Storj%20Final.mp4?wrap=0
Is Storj filesharing the application in question, re:
>>13970134 (pb)
That post notes Ethereum EPSTEIN wallet activity seen on Etherscan.io,
and
some filesharing comments:
"AN NFT IS A PIC, FILE, VIDEO OR SONG CONVERTED INTO A CRYPTO TOKEN
AND ITS PERMANENTLY RECORDED ON THE BLOCKCHAIN WHEN ITS UPLOADED
THATS HOW JOHN IS GOING TO DO IT
THEY CANT TAKE DOWN THE ENTIRE ETHEREUM BLOCKCHAIN
JOHN KNOWS THIS SO HE'S USING IT FOR THE DEADMAN SWITCH FILE
THE NFT IS GOING TO BE A MAGNET URL
THE WHCKD TOKENS ARE ACTIVATING TONS OF SHITBOX VPS'S HE RENTED WITH CRYPTO AND LEFT TO IDLE TILL THEY RECEIVED A TRANSACTION
UNTRACEABLE UNSTOPPABLE REMOTE ACTIVATION
EVERYONE IS GOING TO TORRENT THIS FILE, MCAFEE LEFT SPREADING THE WORD TO EVERYONE ELSE THAT HATED THIS GLOBAL FUCKING DEMON MACHINE"
-
Storj uses the Ethereum blockchain for distributed, encrypted file storage. That matches the text above, generally. So is Storj the suspected host for the purported McAfee dead man's switch, or some other app?
-
"Storj (STORJ) is another cloud storage platform based on the Ethereum blockchain. Every member of a network called Tardigrade can offer free space on their local medium of storage. To become part of the Storj ecosystem, all you need is free disk space and adequate bandwidth to exchange information.
Storj, like other similar services, offers several advantages over traditional cloud storage solutions. As data is encrypted and sharded at the source, there is virtually no way for unauthorized third parties to access the information. Storage is naturally distributed, which in turn increases availability and download speeds through using multiple concurrent connections."
-
Also, a recent analysis of the Storj network, showing a theoretical vulnerability which Storj says could not actually be exploited in production:
"Exploring the Storj Network: a Security Analysis"
https://www.esat.kuleuven.be/cosic/publications/article-3275.pdf