
Nearly a decade after one of crypto’s most painful episodes, a large pool of forgotten Ether tied to TheDAO is being put back to work. This time, not as a risky experiment, but as a long-term security fund for Ethereum.
Roughly $220 million worth of ETH that has sat unclaimed since the infamous 2016 DAO hack is being transformed into a new, ecosystem-wide security endowment. The goal is simple on paper: fund audits, tools, research, and emergency response efforts that help keep Ethereum and its users safe.
To understand why this matters, you have to go back to TheDAO itself.
In early 2016, TheDAO was pitched as a radical idea. A decentralized venture fund governed entirely by code and token holders. It quickly became the biggest crowdfunding event crypto had ever seen, pulling in millions of Ether from participants around the world.
Then it broke.
A flaw in the smart contract allowed an attacker to drain a massive portion of the funds. Panic followed. Debates erupted. And eventually, Ethereum hard-forked to reverse the damage, a decision that permanently split the network and created Ethereum Classic.
What was left behind were fragments of that original system. Contracts that never got emptied. ETH that was never claimed. Funds that, for years, were largely ignored.
Now they are coming back into focus.
The new security fund is built from two main pools of ETH left over from TheDAO era.
The largest portion comes from what is known as the ExtraBalance contract. This Ether was left behind during the original refund process, largely due to overpayments and technical quirks. Today, that balance adds up to more than 70,000 ETH, worth over $200 million at current prices.
Most of that ETH will not be spent outright. Instead, the majority is expected to be staked, generating yield that can fund security work year after year. That turns a one-time windfall into something closer to an endowment.
The second pool is smaller but more immediately usable. Around 4,600 ETH sits in old curator-related wallets connected to TheDAO. Those funds are expected to be deployed more directly toward grants and security initiatives.
Together, they form one of the largest dedicated security funds the Ethereum ecosystem has ever seen.
Ethereum has no shortage of capital, but security spending has often been fragmented. This fund is meant to change that.
The focus is broad by design. Audits for major protocols. Funding for security tooling and infrastructure. Support for incident response teams when exploits happen. Research into emerging risks across layer 2 networks, wallets, and user-facing applications.
There is also an emphasis on user protection, things like phishing detection, transaction safety tools, and services that help everyday users avoid costly mistakes.
Some of the money will likely go to well-known security firms. Some will go to smaller, community-driven projects that quietly do important work but struggle to secure consistent funding.
In a nod to TheDAO’s original vision, the fund will not operate like a traditional foundation grant program.
Instead, distribution is expected to lean heavily on decentralized governance mechanisms. Quadratic funding, retroactive grants, and community voting will all play a role. The idea is to reward impact, not just proposals, and to let a broad set of stakeholders help decide where the money goes.
The Ethereum Foundation will still be involved, particularly in setting guardrails and defining what qualifies as security work. But the ambition is to keep decision-making as open and participatory as possible.
Ethereum is no longer an experimental network. It secures hundreds of billions of dollars in value across DeFi, NFTs, stablecoins, and layer 2 systems. With that scale comes constant pressure from attackers.
Exploits today are faster, more complex, and often more damaging. At the same time, public funding for security work tends to lag behind growth. This fund helps close that gap.
It also reflects a broader shift in how the Ethereum community thinks about risk. Security is no longer something you bolt on at the end. It is infrastructure.
There is something poetic about this moment. I love how they are taking one of Ethereum's darkest moments and turning it in to a security fund to try to ensure that something like this would never happen again.
TheDAO hack forced Ethereum to confront its own limits
It exposed the dangers of unaudited code and untested governance. It shaped how the ecosystem thinks about security to this day.
Turning the remnants of that failure into a permanent security fund feels like closing a loop. A way of acknowledging the past without being defined by it.
If the fund works as intended, one of crypto’s earliest disasters may end up funding its future resilience.


On December 8, Midnight finally goes live. This is the moment the industry has been waiting for. Midnight is not just a new chain and not just another project. It is a fully engineered, zero knowledge powered data protection network that brings real confidentiality to blockchain without sacrificing compliance, security or transparency.
The launch of Midnight marks the beginning of a new era where individuals, developers and global enterprises can use blockchain without exposing everything to the public. Midnight introduces a rational privacy that is programmable, auditable and built for long term scale. There is nothing else like it in the market.
Midnight solves the problem that has limited every major blockchain from reaching full global adoption. Public ledgers reveal personal data, business logic, financial activity and sensitive operations. This stops enterprises from deploying real systems on chain. Midnight flips that limitation into strength.
Developers can create smart contracts with confidential logic, private state updates and selective disclosure. Midnight lets you reveal only what is required while keeping everything else shielded through zero knowledge proofs, enabling real-world application.
Because of its privacy centric architecture, Midnight unlocks use cases that have never been possible at scale.
Private decentralized finance
Confidential business workflows
Secure identity systems
Tokenized documents and assets with controlled access
Encrypted supply chain data
Private DAO voting
Permission controlled data sharing between institutions
Midnight is built specifically for these high value industries. This is why the launch tomorrow is so significant, a production ready privacy network designed for global use.
The December 8 launch is only the beginning of Midnight’s long term vision. Midnight is following a structured, multi phase roadmap that gradually increases capability, decentralization and real world utility. Each phase expands the network in a controlled and secure way, ensuring that privacy and identity features scale responsibly.
Below is a clear breakdown of Midnight’s roadmap based on the official announcement.

This is the phase that begins with the December 8 activation of the Midnight network. Midnight becomes a live, operational chain with NIGHT available as a liquid asset.
Key elements of Phase 1:
Network activation and operational readiness
NIGHT becomes tradable and usable
Early participants, wallets and partners join the ecosystem
The foundation is set for developers to begin exploring Midnight’s capabilities
Hilo marks the transition from development into a functioning privacy network that users and builders can interact with directly.
During this stage, Midnight moves from initial activation into a federated mainnet operated by a combination of foundation validators and trusted partners. This creates a controlled yet fully functional environment for deploying real applications.
Highlights of Phase 2:
Federated mainnet with a secure validator set
Launch of the first privacy enabled DApps using Midnight’s zero knowledge architecture
Real applications begin leveraging features such as selective disclosure, private state, confidential identity and shielded computation
This is where Midnight shifts from infrastructure into a true application platform. Developers begin delivering privacy focused solutions that cannot be built on transparent chains.
Mōhalu expands Midnight toward broader community participation. Block production begins opening up to more operators and the network starts preparing for full decentralization.
Core advancements in Phase 3:
Wider validator participation including future stake pool operators and community nodes
Stress testing and economic validation of the network
Activation of the DUST capacity exchange that powers private computation
Community involvement in testing scalability, privacy performance and governance mechanisms
This phase transforms Midnight from a limited validator model into an emerging decentralized network with a functioning economic system based on NIGHT and DUST.
Phase 4 represents the full maturity of Midnight. The network completes its transition into a decentralized, community governed privacy platform.
Key outcomes of Phase 4:
Complete decentralization of block production
NIGHT holders govern the network through on chain voting and proposal systems
Support for Hybrid DApps that integrate Midnight’s privacy layer into other chains and platforms
Cross chain interoperability where other networks can use Midnight as a privacy and identity service
At this stage, Midnight becomes not only a standalone privacy chain but also a universal privacy infrastructure for the broader blockchain industry.
Even though Midnight is its own network, it operates as a data protection partner chain anchored to Cardano. This creates enormous value for ADA holders, Cardano developers and the entire ecosystem.
Cardano becomes the only major blockchain ecosystem with a production level privacy chain that remains regulation friendly. This is a massive competitive advantage. Cardano can now serve transparent applications and private applications without compromising security.
NIGHT is a Cardano native asset. Anyone who wants to use Midnight must interact with the Cardano ecosystem. This brings new wallets, new users, new liquidity and new developers directly into Cardano from multiple external ecosystems.
Cardano is now positioned as a realistic option for industries that need confidentiality. Finance, healthcare, supply chain, identity, enterprise management systems. These businesses can use Midnight for private computation while relying on the stability and settlement layer of Cardano.
Cardano has always focused on research, formal methods and sustainable architecture. Midnight takes that foundation and adds a powerful privacy dimension. This is the kind of advancement that reshapes how the industry sees Cardano.
Midnight is not a side project. It is a core evolution of the ecosystem.
If you earned NIGHT through the Midnight distribution, the process to claim and redeem your tokens is straightforward once you know what to expect.
Start by heading to the official Midnight Claim Portal. You will be asked for two things.
Your origin address
This is the address from the chain where you qualified. It might be a Cardano address or it could be from another supported chain like Bitcoin, Ethereum, Solana, XRP, BNB, Avalanche, or BAT. Midnight uses this to verify that you were eligible at the snapshot.
Your destination address
This is your Cardano wallet where you want to receive your NIGHT tokens. Any supported Cardano wallet works, as long as it is one you personally control.
Once both addresses are entered, you will need to accept the terms and sign a short verification message. This proves you actually own the origin address. After you submit everything, your NIGHT allocation is officially claimed and locked in the system.
This is where Midnight does things a little differently. Your tokens do not unlock all at once. Instead, your allocation gradually thaws over a 360 day schedule. Midnight splits your total amount into four equal parts and each one unlocks roughly every ninety days.
The first unlock happens at a random time somewhere in the first ninety days after you claim. After that, each remaining quarter unlocks in sequence. It is a slow and steady release rather than a single burst, which helps keep the ecosystem healthy during the first year.
Once your first portion has thawed, you can redeem it right away.
Go back to the Claim Portal, choose the unlocked portion and confirm the redemption. Your Cardano wallet will ask you to approve a small transaction fee. After the transaction goes through, your NIGHT tokens will appear in your wallet under the correct policy ID.
You can redeem each portion as it unlocks or wait until the end and redeem everything at once. It is entirely up to you.
When the main redemption window ends, Midnight gives everyone an additional grace period to collect anything they have not redeemed yet. It is always best to stay on top of your thaw schedule, but the grace period gives you a buffer in case you miss something.
Once that time expires, collecting unredeemed tokens becomes a much more manual process, and it is not something you want to deal with if you can avoid it.
Always use the official Midnight Claim Portal, not third party links.
Make sure your origin address comes from a wallet you control, since you need to sign the verification message.
Keep a bit of ADA in your Cardano wallet so you can cover redemption fees.
Double check your destination address before submitting. It is worth the extra moment.
Midnight is not launching as an experiment. It is launching as a fully engineered, privacy centric blockchain ready for real adoption. December 8 is the beginning of a network built for global scale and long term impact.
Midnight brings confidential smart contracts into the mainstream. It gives developers the tools they have needed for years. It gives institutions a way to embrace blockchain without risking sensitive data. It gives Cardano a massive new frontier for growth.
Most of all, Midnight shows the world that privacy and transparency can work together. The chain is built to protect people, empower businesses and open the door to applications that were never possible before.
This is the start of a major shift in the industry. Midnight is ready. December 8 is the breakthrough moment.
You can stay up to date on all News, Events, and Marketing of Rare Network, including Rare Evo: America’s Premier Blockchain Conference, happening July 28th-31st, 2026 at The ARIA Resort & Casino, by following our socials on X, LinkedIn, and YouTube.

The decentralized finance (DeFi) protocol Balancer is facing scrutiny after more than $110 million in assets were drained from its pools in what appears to be a large-scale exploit. Early reports surfaced from blockchain analysts, including @AdiFlips on X, who tracked the initial transactions and raised alarm over millions of dollars in outflows from Balancer’s smart contracts.
Balancer’s smart contracts began showing suspicious transactions involving Wrapped Ether (WETH), Lido staked Ether (wstETH), and Origin staked Ether (osETH) on October 30. According to on-chain data shared by @AdiFlips, the transactions originated from Balancer’s “manageUserBalance” function, a part of its V2 smart contract system that handles user funds and pool accounting.
In just a few minutes, an unknown address moved more than $70 million worth of assets across multiple transactions. Follow-up analysis by several DeFi monitoring platforms later confirmed that total outflows exceeded $110 million, with funds being consolidated into a single wallet.
On X, @AdiFlips posted the first thread highlighting the exploit, noting that the “manageUserBalance” function was being abused. He showed that the attacker was able to call the function in a way that bypassed standard permission checks, allowing them to drain funds from liquidity pools without ownership validation.
In his breakdown, he wrote:
“It looks like the Balancer exploit is real. Someone managed to bypass
msg.sendervalidation in themanageUserBalancefunction, allowing them to transfer tokens directly. Funds are being drained quickly.”
His real-time tracking of the attacker’s wallet provided the first public warning to liquidity providers (LPs), prompting many to start pulling funds before further losses.
Balancer confirmed the issue shortly after the exploit began, posting an update on X:
“We are aware of a potential exploit impacting Balancer V2 pools. Our engineering and security teams are investigating with high priority.”
The team said it has contacted major blockchain security groups and forensic analysts to trace the funds and assess the exploit’s scope. Balancer has also offered a 20% white-hat bounty for the return of the stolen assets, promising leniency if the attacker cooperates.
If the funds are not returned within 48 hours, Balancer stated it would pursue the matter through law enforcement and deeper blockchain forensics, including cross-referencing IP, ASN, and timestamp data linked to on-chain activity.
Preliminary technical analysis suggests the attacker exploited a logic flaw in Balancer’s contract validation process. Specifically, they were able to manipulate the manageUserBalance function, which is responsible for handling deposits and withdrawals.
Normally, the function should only execute balance changes initiated by the user calling the transaction. However, a missing or incorrect sender check may have allowed the attacker to impersonate users and withdraw assets from shared liquidity pools.
This kind of bug falls under the category of access control vulnerabilities, a recurring issue in complex DeFi protocols that handle multiple users’ funds through permissioned functions.
The exploit affects liquidity providers (LPs) participating in Balancer V2 pools, particularly those containing wrapped and staked Ethereum assets. If you are a Balancer LP, you should:
Check your wallet and pool exposure immediately.
Exit vulnerable pools until Balancer issues a full post-mortem.
Avoid interacting with any unverified Balancer contracts during the investigation period.
Balancer has not yet confirmed whether all funds can be recovered, but the incident has already shaken confidence in one of DeFi’s longest-running automated market makers.
The broader DeFi community reacted quickly. Security researchers and analysts echoed @AdiFlips’ findings, noting that the exploit underscores a recurring challenge in smart contract design. Small logic errors in permission validation can lead to massive financial losses.
Developers from other major protocols, including Curve and Uniswap, have reportedly reviewed similar functions in their contracts to ensure they are not exposed to the same vulnerability.
Meanwhile, crypto security firms have begun tracking the attacker’s wallet movements, which show small transfers through decentralized exchanges, possibly testing laundering routes or trying to break traceability before moving funds to privacy protocols.
Balancer’s exploit is not just another DeFi hack. It is a reminder that code complexity equals risk, even for mature platforms. Balancer has handled billions in total value locked (TVL) since launching in 2020, making this one of the largest potential breaches in its history.
The event highlights three broader trends in DeFi:
Smart contract logic flaws remain a top vulnerability, even after audits.
Real-time community alerts like those from @AdiFlips play a crucial role in limiting damage.
Protocol accountability and transparency are now as important as code security itself.
Balancer’s team is expected to publish a full incident report once its investigation concludes. They will likely propose governance measures to patch affected contracts and possibly establish compensation paths for liquidity providers who lost funds.
For now, on-chain watchers continue to track the exploiter wallet, which still holds tens of millions in Ether and related assets. Whether this turns into a partial recovery or another unsolved multimillion-dollar DeFi theft remains to be seen.
This exploit shows that even well-established DeFi protocols remain vulnerable to subtle design flaws. While Balancer’s prompt communication and bounty offer were commendable, the event reinforces the need for constant contract monitoring, active audits, and responsible disclosure systems across the sector.
For users, the lesson is simple: DeFi rewards innovation, but it still carries risk. Stay alert, follow verified analyst updates, and never assume any protocol is too established to be exploited.
You can stay up to date on all News, Events, and Marketing of Rare Network, including Rare Evo: America’s Premier Blockchain Conference, happening July 28th-31st, 2026 at The ARIA Resort & Casino, by following our socials on X, LinkedIn, and YouTube.