I agree that hacking is not when all funds are stolen, but somehow, it is not just only him was stolen his money
How does someone just hack an amount of only one user? I believe it is a data system error.
There are a few casinos that exist in this space now, Yolodice is one of the top choices. With hacking it means it could lose its ability to compete with a few other casinos
But anyway, just speculation, I want to hear the answer from @examplens
Yes, I received an answer from Yolo dice. I must say they were very kind but they didn't help me. His point is that is my fault. of course, it is insane to expect an explanation of where their guilt might be. It is bad for business and his reputation.
I didn’t answer earlier because I did a scan my computer, searching for anything suspicious (I did not found anything unusual). All my other accounts, on exchanges, on this forum, on social media accounts, some of my hosting and other servers, few altcoin wallets... they are still unchanged without any suspicious activities.
Hi, Ethan here from YOLOdice. I find these accusations strange, especially given the fact we exchanged emails and after receiving my analysis you never replied. But since you brought the discussion here, I have to answer publicly.
Note, I'm cross-posting the same reply at our YOLOdice topic at
https://bitcointalksearch.org/topic/m.54549027 :
--------------
If this was a hack, then all my logs indicate that the source is the victim's PC. My server logs show clearly that the request to close the investment comes from user's PC. Before that, the connection was hanging idle for several hours, doing regular browser<->server request. It looks like normal traffic from the browser and most likely was. So after a few hours of idling there comes a request to close an investment, exchange DOGE to BTC and withdraw, and connection closes.
There were no unauthorized logins to the server, just regular traffic, all from
the same IP and the same browser.
It's not possible that this amount of logs was created by hacking into YD servers. Logs are distributed to a few machines, and they are different kind of logs - authorization logs and system logs, access logs and event logs. We use centralized ELK server for logs to make log analysis much easier (and possible) and be able to correlate logs related to a single event. Believe me, I know what I am doing here.
I can say with 100% certainty the source of the "hack" is external. I don't want to contradict anyone's story without having the knowledge of what happened, but analyzing the situation on my end there are 2 possibilities:
1. The user leaves the PC on, logged into YD, for a few hours, unprotected. Someone else comes by, uses physical access to the PC and uses the opportunity to quickly wipe the account clean.
2. The PC is infected with malware and remote hacker can take control over PC, manipulate the open browser and act on user's behalf.
I cannot see how we could take responsibility in any of these cases. There is literally nothing that would indicate a different scenario.
Rest assured, YD is secure.
Cheers,
Ethan