My question relates to a older question on this stackexchange.
Details
Patrick used the Ethereum Wallet to transfer 1 ether to test out buying TheDAO tokens on his mining computer. When (so far it seems that) Ethereum wallet unlocked his geth wallet for 2 seconds (via the IPC API, not exposed to the Internet), a bot that was watching his geth wallet activity swooped in to send a transfer instruction to geth (via JSON-RPC, exposed to the Internet) and transferred his remaining 7218 ethers into the hacker's account.
Did this bug ever got fixed or is still in the newest version of mist and how could i check if I am vulnerable to this attack or not? Did the developer had a special why they implementet it this way or isn‘t even possible to implement it in other way?
web3.personal.unlockAccount(Session.get('data').from, pw || '', 2, function(e, res){. Do you have a idea why they are talking about two senconds? – Flaqz Jun 25 '18 at 16:31unlockAccount(...), thensendTransaction(...)call has now been replaced withweb3.eth.personal.signTransaction(...)- https://github.com/ethereum/mist/blob/master/interface/client/templates/popupWindows/sendTransactionConfirmation.js#L461 . The signed transaction is now generated within Ethereum Wallet / Mist, and the signed transaction is passed on togeth. There is now no need for Ethereum Wallet / Mist to getgethto unlock any accounts. – BokkyPooBah Jun 27 '18 at 13:38