{"id":14482,"date":"2025-10-27T20:51:00","date_gmt":"2025-10-27T20:51:00","guid":{"rendered":"https:\/\/bitunikey.com\/news\/interview-crypto-recovery-is-a-myth-prevention-is-key-circuit\/"},"modified":"2025-10-27T20:51:20","modified_gmt":"2025-10-27T20:51:20","slug":"interview-crypto-recovery-is-a-myth-prevention-is-key-circuit","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/interview-crypto-recovery-is-a-myth-prevention-is-key-circuit\/","title":{"rendered":"Interview | Crypto recovery is a myth, prevention is key: Circuit"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">Victims of crypto hacks often find themselves victimized again by unscrupulous recovery firms, says Harry Donnelly, CEO of Circuit. <\/p>\n<div id=\"cn-block-summary-block_e2ac65fd20ebcc72f3edb5b60380ce26\" class=\"cn-block-summary\">\n<div class=\"cn-block-summary__nav tabs\">\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/div>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>Most crypto recovery efforts after a hack are futile, says Circuit CEO<\/li>\n<li>95% of recovery firms could be predatory and offer no support<\/li>\n<li>Prevention is key, as $3B was already lost to hacks this year<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>Crypto adoption is rising, and an increasing number of people are joining. However, despite years of innovation, crypto is still failing some of its most vulnerable users. In a recent incident, a U.S. retiree lost $3 million in XRP after unknowingly compromising their cold wallet. <\/p>\n<p>The incident shows that security is still the top issue in crypto. For this reason, crypto.news spoke to Harry Donnelly, CEO of the crypto security firm Circuit. He explained why the ecosystem lost over $3 billion to hacks this year alone, and why recovery is usually very difficult. <\/p>\n<p><strong>Crypto.news:<\/strong> <strong>We\u2019ve seen a recent security incident where a wallet holder lost their life savings in a hack. What does this tell us about crypto asset security?  <\/strong><\/p>\n<p><strong>Harry Donnelly: <\/strong>This is the XRP wallet incident: an alleged U.S. retiree lost about $3 million in XRP, their retirement savings. ZacXBT posted about it on Twitter. The victim said they tried to file a police report but couldn\u2019t reach law enforcement. The funds were then laundered across roughly 120 transactions.<\/p>\n<p>We don\u2019t have full confirmation of the exact vector because the victim isn\u2019t crypto-savvy; without access to their laptop to trace the steps, it\u2019s hard to be certain. But cases like this often involve malware that scans a device for seed phrases and other secrets.<\/p>\n<p>In this case, the person thought they had a cold wallet \u2014 purchased from Ellipal \u2014 but they imported the seed phrase onto their laptop. That defeats cold storage: once the seed phrase exists on an internet-connected machine, the hardware wallet\u2019s protection is effectively gone.<\/p>\n<p><strong>CN:<\/strong> <strong>ZacXBT said many recovery firms are questionable. What is your view?<\/strong><\/p>\n<p><strong>HD:<\/strong> Totally fair. When people are desperate, bad actors will prey on them. The worst actors often SEO-optimize their pages so they appear first when someone frantically searches \u201crecover stolen crypto.\u201d<\/p>\n<p>Legitimate recovery is hard. Crypto is a bearer asset: possession of the key equals ownership. You can\u2019t call a bank and reverse an on-chain transfer. Legit recovery firms are typically legal shops that work with law enforcement, use blockchain forensics tools like Chainalysis or TRM Labs, track the funds, and try to get exchanges to freeze accounts with legal notices.<\/p>\n<p>But that only works if funds hit a KYC exchange willing and able to cooperate and if the jurisdiction is cooperative. Attackers often route funds to non-cooperative exchanges or mixing services; last year, under 5% of assets were recovered with those methods.<\/p>\n<p>Predatory firms will charge something like $10,00 large fees for basic scans and produce a report that gives victims false information. For example, they tell them to email Tornado Cash, which is useless.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p><strong>CN:<\/strong> <strong>So it seems like recovery is a long shot. What\u2019s the alternative?<\/strong><\/p>\n<p><strong>HD: <\/strong>Because recovery probabilities are low, prevention is critical. Circuit focuses on preventing loss rather than relying on post-hack recovery. Once funds leave a wallet, chances of recovery are slim; stopping theft before it happens has a much higher success probability.<\/p>\n<p>There are two loss modes: (1) you lose access to your private key (funds are inaccessible) or (2) someone else obtains your private key (funds are stolen). Circuit addresses both by protecting the assets directly rather than solely protecting the key.<\/p>\n<p>We build what we call automatic asset extraction. Instead of only safeguarding a private key, we pre-create signed transactions that move funds to a predefined backup wallet. Those transactions are created ahead of time, encrypted, and stored \u2014 never broadcast unless the legitimate user triggers them. <\/p>\n<p><strong>CN: So, who controls that big red button? <\/strong><\/p>\n<p><strong>HD: <\/strong>The user controls it. They go into our web app, verify their identity using 2FA, and press the button. That decrypts and broadcasts the transaction, and the funds move to the backup wallet.<\/p>\n<p>We store the pre-signed transaction, encrypted, but the user is the only one who can decrypt and trigger it. They define the destination address in advance, and we cannot change that address. Once it\u2019s signed, it\u2019s locked. Our system simply holds it securely and allows the user to trigger it when needed.<\/p>\n<p><strong>CN:<\/strong> <strong>Who uses this service at the moment? <\/strong><\/p>\n<p><strong>HD:<\/strong> Right now, it\u2019s all institutions and enterprises. We don\u2019t serve retail users yet. Our partners are exchanges, asset managers, OTC desks. These are people managing large sums and client assets. For them, downtime or loss of access can be catastrophic.<\/p>\n<p>One example is Shift Markets. We\u2019re deploying our technology across 150 exchanges that they work with. These exchanges can\u2019t afford to lose access to funds, even for a few hours.<\/p>\n<p>For institutions, it\u2019s not just about preventing theft. Sometimes someone misplaces a signing device, or a service like Fireblocks goes down. That can halt all operations \u2014 no deposits, no withdrawals.<\/p>\n<p>With Circuit, they can recover within minutes instead of being down for days. And for them, that can mean saving their reputation \u2014 and millions in customer retention.<\/p>\n<p><strong>CN: And how do users choose their backup wallets? Should it be another hardware wallet, an exchange account, or a custodian?<\/strong><\/p>\n<p><strong>HD: <\/strong>Great question. We recommend that the backup wallet be just as secure as the primary. So that means using different wallet providers, storing keys in different locations, and making sure the infrastructure isn\u2019t co-located. You don\u2019t want both sets of keys in the same vault or server.<\/p>\n<p>Also, we enforce quorum approvals \u2014 4-eyes or 6-eyes policies \u2014 to avoid any single point of failure. Most large institutions already operate this way. Some use different MPC or multisig setups for primary and backup wallets. Others use different secure facilities or even different jurisdictions. The idea is: if disaster hits one system, the other is unaffected.<\/p>\n<p>We also work with major insurance companies, and they recognize this as a risk reducer. A lot of crypto insurance claims are for lost access or stolen funds. By adding Circuit\u2019s technology, firms become a lower risk. So insurance providers offer discounts to clients who use us. That makes insurance more accessible and, in turn, brings more institutional capital into crypto.<\/p>\n<p><strong>CN:<\/strong> <strong>Have you actually had any cases where someone had to use the red button? <\/strong><\/p>\n<p><strong>HD:<\/strong> Yes, we\u2019ve used the red button, both in real cases and in controlled tests. We\u2019ve even intentionally given access to attackers in white-hat or simulation environments to try and steal the funds. Every time, it\u2019s held up. Our engineering team has worked hard to make sure we\u2019ve covered edge cases and real-world threats.<\/p>\n<p>We\u2019re working with some of the biggest players in the space who\u2019ve tested it independently. We\u2019ll have a public announcement in the next month or two showcasing some of those validations.<\/p>\n<p><strong>CN: And for institutions, the typical failure scenario?<\/strong><\/p>\n<p><strong>HD:<\/strong> It depends on their wallet setup. If they\u2019re using non-custodial services like Fireblocks, the institution bears some responsibility \u2014 they must be able to access their wallets even if Fireblocks is down or unavailable.<\/p>\n<p>If they\u2019re using fully custodial solutions like Coinbase or Anchorage, those providers manage everything end-to-end. But with Fireblocks, you still need your own secure access to the key shards or signing devices.<\/p>\n<p>So imagine an exchange relying on Fireblocks, and they lose a device \u2014 maybe someone\u2019s phone or YubiKey. That can temporarily lock them out, halting withdrawals and deposits.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p><strong>CN: You mentioned earlier that attackers are getting more sophisticated. What\u2019s your perspective on how the crypto industry is adapting to that? What\u2019s changing in security?<\/strong><\/p>\n<p><strong>HD: <\/strong>It\u2019s similar to Web2 cybersecurity; it\u2019s a cat-and-mouse game. New attacks emerge, we build defenses, attackers evolve again, and so on. Early on, the big breakthrough was multisig, requiring multiple keys to approve transactions.<\/p>\n<p>Then came MPC wallets (multi-party computation), which improve on multisig. In a multisig setup, compromising two out of three keys gives you partial info about the third. In MPC, that\u2019s not the case as each shard gives you no info about the whole, making it more resilient.<\/p>\n<p>Companies like Fireblocks have had a lot of success with MPC. Then on top of that came policy engines \u2014 rules that block transactions under certain conditions. For example: \u201cblock all transfers over $1 million,\u201d or \u201cdon\u2019t allow transfers to non-whitelisted addresses.\u201d <\/p>\n<p>Then came detection tools, which are services that monitor chain activity and flag suspicious behavior. But today, most of those still require a human to act on the alert. In some setups, you might need approvals from people in the U.S., Europe, and Asia, which could take hours. Meanwhile, attacks are happening in minutes or even seconds.<\/p>\n<p>We saw this in the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/harrydonnelly.substack.com\/p\/swissborgkiln-exploit-breakdown?r=6a008\" target=\"_blank\" rel=\"nofollow\">SwissBorg\/Kiln hack<\/a>: $41 million gone in three minutes. Humans simply don\u2019t respond that fast. <\/p>\n<p><strong>CN: When centralized exchanges freeze stolen funds, people usually understand. But when DeFi protocols freeze wallets or pause smart contracts, there\u2019s often criticism about centralization. What\u2019s your view on that?<\/strong><\/p>\n<p><strong>HD:<\/strong> Look, ultimately, I think if you can prevent tens or hundreds of millions of dollars being stolen, and what it takes is to shut down a smart contract for a few hours, then I think you should do that.<\/p>\n<p>I know there are very big proponents of decentralization, but decentralization is not going to take hold if people don\u2019t adopt it. And people are not going to adopt it if they\u2019re going to lose all their funds. At the end of the day, I think it\u2019s as simple as that.<\/p>\n<p>If you truly believe in this and want it to be adopted by the mainstream \u2014 by actual enterprises, actual institutions \u2014 they\u2019re going to have to have confidence in it. And for all the proponents who say \u201cjust let it be hacked,\u201d or \u201ccode is law,\u201d I think the issue is that it\u2019s going to fundamentally stop the growth of the space as much as we\u2019d like it to grow.<\/p>\n<p>And I think there are two areas you\u2019re going to see. You\u2019ll have pools and protocols that are just going to keep doing things the way they are \u2014 just letting things run. And then you\u2019re going to have more institutionally focused and enterprise-focused infrastructure, where they do have safeguards, where they do have failsafes, and where there is insurance built into the pools.<\/p>\n<p>That\u2019s already happening. And it\u2019s in those pools that you\u2019re going to see a lot more liquidity being deposited, because that\u2019s where the real capital \u2014 the institutions \u2014 feel confident putting their funds. And when you think about what the biggest network effect in DeFi is, a lot of it comes down to liquidity.<\/p>\n<p>So if you look at where a lot of liquidity is going to go, over time it should shift toward the places that have failsafes and checks in place \u2014 because it gives people more confidence.<\/p>\n<p><strong>CN: But someone might say, if a protocol has the ability to freeze wallets or pause smart contracts, don\u2019t they also have the ability to drain the pool? What\u2019s your take on that?<\/strong><\/p>\n<p><strong>HD: <\/strong>Yeah, and I think that\u2019s a fair point. If someone has the ability to pause it and put safeguards in place, does that also mean they can do anything they want with the funds?<\/p>\n<p>I think the beauty of smart contracts \u2014 if you do them right \u2014 is that they\u2019re immutable and transparent. You can define strict parameters ahead of time. You can hard-code the rules: when does this get paused, why does it get paused, and what happens to the funds after?<\/p>\n<p>Do they get moved? If so, where? Can they only be moved to a specific location? After the pause, do they get returned? All of that can be encoded. It doesn\u2019t have to be discretionary.<\/p>\n<p>So yes, if you give people full control to do whatever they want, that\u2019s not great. People won\u2019t want to deposit funds into those protocols. But if there are tightly defined parameters over what\u2019s possible \u2014 and part of that includes freezing or pausing in the case of an emergency \u2014 then that actually gives people more confidence.<\/p>\n<p>Because even the biggest protocols \u2014 like Euler, which had a huge TVL \u2014 got hacked. And they\u2019d gone through multiple audits, code reviews, the whole thing. But there was still a small vulnerability that someone was able to exploit.<\/p>\n<p>We are getting better at detecting these things, but new issues will always pop up. And like you said, it\u2019s a cat-and-mouse game. You build a defense, then someone finds a new attack. Then you build a new defense, and so on.<\/p>\n<p><strong>CN: Is there anything you\u2019ve been thinking about lately that you think the industry is overlooking?<\/strong><\/p>\n<p><strong>HD: <\/strong>One of the things we spend a lot of time on internally is trying to make crypto insurance actually accessible \u2014 because when you go back to what we\u2019ve been talking about, right? There are always going to be new attacks, and then people will build new defenses. But something has to fill that gap in the meantime.<\/p>\n<p>I think DeFi insurance \u2014 like what Nexus Mutual was trying to do \u2014 hasn\u2019t really scaled the way people hoped. And a big part of that is because to offer meaningful insurance, you need enormous pools of capital behind it. That\u2019s just how insurance works.<\/p>\n<p>The traditional insurance world already has billions of dollars sitting in reserves. They know how to underwrite risk. If we can bring those players into the crypto space \u2014 and give them confidence in how risks are being mitigated \u2014 then we unlock something really big.<\/p>\n<p>Because the truth is, if we want big banks or serious financial institutions to get involved in DeFi and on-chain finance, they\u2019re going to need insurance. Full stop.<\/p>\n<p>So if we can enable that \u2014 if we can give traditional insurers the tools and data they need to price risk and actually offer coverage \u2014 then suddenly, you\u2019ve got a lot more capital that\u2019s comfortable coming into the space.<\/p>\n<p>And when that happens, everything grows. The protocols grow, the infrastructure matures, the users benefit. So yeah \u2014 I think unlocking real crypto insurance is one of the most important things we can do right now.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Victims of crypto hacks often find themselves victimized again by unscrupulous recovery firms, says Harry Donnelly, CEO of Circuit. Summary Most crypto recovery efforts after a hack are futile, says&hellip;<\/p>\n","protected":false},"author":1,"featured_media":14483,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/14482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=14482"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/14482\/revisions"}],"predecessor-version":[{"id":14484,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/14482\/revisions\/14484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/14483"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=14482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=14482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=14482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}