The brute force attacks didn't break through, but it's been fixed so they can't use a brute force attack to get into the system at all now. Should I give details about how they found the vulnerability and were able to steal the eth? Maybe some would-be hackers would like some tips on how they hacked us. Not that we can be hacked like that again, but others may be vulnerable.We really dont need this type of detail, just to know where vulnerability was: pool software, wallet that you using or eth See full review