{"id":51805,"date":"2023-05-08T14:00:00","date_gmt":"2023-05-08T14:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/why-the-ftx-collapse-was-an-identity-problem"},"modified":"2023-05-08T14:00:00","modified_gmt":"2023-05-08T14:00:00","slug":"why-the-ftx-collapse-was-an-identity-problem","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/","title":{"rendered":"Why the FTX Collapse Was an Identity Problem"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The romance with cryptocurrency is over. After years of growth and investment gains, things came tumbling down with the collapse of the <a href=\"https:\/\/www.darkreading.com\/risk\/rethinking-risk-after-the-ftx-debacle\" target=\"_blank\" rel=\"noopener\">FTX Trading exchange<\/a> in November 2022. The carnage was palpable.<\/p>\n<p>Since then, investors have dumped crypto, the news media has churned out a stream of stories about failed exchanges, and political leaders have demonized digital currencies. And all for good reason.<\/p>\n<p>At a US House Financial Services Committee hearing last December, <a href=\"https:\/\/fortune.com\/2022\/12\/13\/ftx-ceo-john-ray-testifies-congress-no-record-keeping-quickbooks-bankman-fried\/\" target=\"_blank\" rel=\"noopener\">John J. Ray, the new CEO of FTX<\/a>, admitted to lawmakers that there had been &#8220;no record keeping whatsoever,&#8221; and confessed that the crypto exchange had essentially engaged in &#8220;old-fashioned embezzlement.&#8221;<\/p>\n<p>So, it&#8217;s understandable that markets, politicians, the press, and the public are seething. At first glance, all this chaos and turmoil indicates that something is fundamentally wrong with crypto. However, nothing could be further from the truth.<\/p>\n<p>The stampede away from crypto isn&#8217;t a referendum on its value to society \u2014 or on the underlying blockchain technology. The affliction affecting crypto is, at its heart, an <em>identity<\/em> problem.<\/p>\n<h2 class=\"regular-text\">Moving Beyond Currencies<\/h2>\n<p>Crypto enables transactions through the Internet and metaverse that otherwise aren&#8217;t possible. Along with blockchain, it allows individuals to maintain ownership over money, data, and other assets in a highly interconnected digital world, and without a central authority.<\/p>\n<p>But while digital ownership is crucial for unleashing all sorts of innovation, there&#8217;s a problem exposed by the FTX collapse. It&#8217;s the built-in security flaws of the digital wallets that held individuals&#8217; crypto assets.<\/p>\n<p>Clients at FTX lacked the one thing that could have protected their funds: They didn&#8217;t own the encryption keys to their digital wallets. FTX \u2014 the central authority \u2014 did. And with no regulators in place to oversee transactions and interactions, things spiraled out of control.<\/p>\n<h2 class=\"regular-text\">Digital Wallets Hold the Keys to Crypto<\/h2>\n<p>A digital wallet with crypto allows a person to buy and exchange <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/nft-centric-attacks-are-increasing\" target=\"_blank\" rel=\"noopener\">nonfungible tokens (NFTs)<\/a> and other digital assets, and even use physical objects in the virtual world, and vice versa.<\/p>\n<p>While blockchain moved the administration of digital assets away from a central authority (e.g., banks), the digital wallet acting as a vault to those assets has generally remained under the control of the central authority. This is what allowed FTX to access client funds without consent.<\/p>\n<p>What&#8217;s currently lacking is a built-in mechanism for establishing ownership online and then securing the wallet to that identity. Fortunately, the answer isn&#8217;t complicated, nor is it terribly expensive. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Self-sovereign_identity\" target=\"_blank\" rel=\"noopener\">Self-sovereign identity<\/a> (SSI) gives users control over their digital identity \u2014 and everything that comes with it. This includes digital currency, virtual objects, NFTs, and more. Think of an SSI as a secure and private digital passport that fuses identity data and an identity wallet.<\/p>\n<p>SSI is critical for building out a virtual world that matches trust that already exists in the physical world. These include property rights; laws and regulations set by governments and financial institutions so that it&#8217;s possible to transfer ownership of property and goods; and central administrators like escrow companies that manage larger, more complex transactions.<\/p>\n<p>With a secure digital wallet, the equation flips from inherently unsafe and untrusted to an environment that offers a high level of security. Without it, it&#8217;s impossible to unlock the full value of Web3, the metaverse, and other decentralized token-based innovations.<\/p>\n<h2 class=\"regular-text\">A Matter of Identity<\/h2>\n<p>Arriving at this higher plane requires a basic recognition: Before anyone can trust anything, it&#8217;s critical to prove a person&#8217;s identity. Unfortunately, passwords are inherently weak and easily compromised, multifactor authentication is clumsy and far from foolproof, and third-party authenticators are a pain to use. They add steps and time to what should be an ultra-fast task.<\/p>\n<p>Meanwhile, the same Web3-powered decentralized technologies, like blockchain, that underpin cryptocurrency can deliver SSI and provide users with control over their personal data. Instead of relying on third parties for identity verification, an SSI framework can be used to store multiple verified identity documents, such as a passport, driver&#8217;s license, tax documents, etc., in a secured digital wallet.<\/p>\n<p>A blockchain-based distributed ledger allows all IDs placed in the wallet to be managed by the user so they can control which identity data they want to share with third parties, including financial service providers, government agencies, healthcare providers, etc. The adoption of SSI makes it possible to bake security into cryptocurrency and a Web3 world, by fully vetting and verifying an individual using a paired public-private key to bind their identity and verified credential documents.<\/p>\n<p>In addition, by adhering to well-established technical authentication standards and incorporating blockchain, SSI eliminates the need for an individual&#8217;s identity to be locked into each provider&#8217;s ecosystem. Since users have control over when, with whom, and under what conditions they share elements of their digital identity, fraud incidents like FTX can be eliminated.<\/p>\n<p>Of course, digital transactions will continue to trend upward and a growing array of activities \u2014 and interactions \u2014 will span the physical and digital worlds. The need for a more secure framework for goods, objects, and property rights must take shape, preferably sooner rather than later. With the right identity safeguards and controls, we can reduce fraud and facilitate growth and innovation online. Cryptocurrency has a valuable role to play in a Web3 world \u2014 but only if the public can fully trust it.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/why-the-ftx-collapse-was-an-identity-problem\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency has a valuable role to play in a Web3 world \u2014 but only if the public can fully trust it.Read More <a href=\"https:\/\/www.darkreading.com\/operations\/why-the-ftx-collapse-was-an-identity-problem\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51805","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why the FTX Collapse Was an Identity Problem 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why the FTX Collapse Was an Identity Problem 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why the FTX Collapse Was an Identity Problem\",\"datePublished\":\"2023-05-08T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/\"},\"wordCount\":900,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta80751ba94c99b24\\\/64556aaa25011c61a1291b66\\\/Blockchain_JL_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/\",\"name\":\"Why the FTX Collapse Was an Identity Problem 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta80751ba94c99b24\\\/64556aaa25011c61a1291b66\\\/Blockchain_JL_Alamy.jpg\",\"datePublished\":\"2023-05-08T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta80751ba94c99b24\\\/64556aaa25011c61a1291b66\\\/Blockchain_JL_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blta80751ba94c99b24\\\/64556aaa25011c61a1291b66\\\/Blockchain_JL_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-the-ftx-collapse-was-an-identity-problem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why the FTX Collapse Was an Identity Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why the FTX Collapse Was an Identity Problem 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/","og_locale":"en_US","og_type":"article","og_title":"Why the FTX Collapse Was an Identity Problem 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-08T14:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why the FTX Collapse Was an Identity Problem","datePublished":"2023-05-08T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/"},"wordCount":900,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/","url":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/","name":"Why the FTX Collapse Was an Identity Problem 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg","datePublished":"2023-05-08T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blta80751ba94c99b24\/64556aaa25011c61a1291b66\/Blockchain_JL_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-the-ftx-collapse-was-an-identity-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why the FTX Collapse Was an Identity Problem"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51805"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51805\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}