Band Protocol denies any role in the mysterious origins of SushiSwap

Published at: Sept. 8, 2020

Following the sudden exit of SushiSwap’s anonymous founder, many users have begun to speculate on the identity of this controversial figure.

While some focused on the current maintainer of the project Sam Bankman-Fried, the CEO of FTX, others saw Band Protocol’s chief technology officer, Sorawit Suriyakarn, as the person behind this project.

The evidence cited primarily involved the Sushiswap.org domain, which is provably shown to be hosted on the same IP address as Band Protocol’s website. 

In an email conversation with Cointelegraph, CEO of Band Soravis Srinawakoon said that this evidence is misleading, and refuted all allegations that the project is behind SushiSwap.

He did concede that Suriyakarn was approached by Chef Nomi for a code review. Suriyakarn did provide such a review “to make sure no user funds will be lost,” since BAND was one of the tokens that could be used to farm SUSHI. “We naturally wanted to support such an idea because it could directly benefit BAND holders and Sushiswap was not the only project we have done such a thing,” Srinawakoon added.

He went on to explain that the IP addresses are indeed the same, because both websites are hosted on Render — a hosting service that “has been gaining in popularity.” It is true that many other completely unrelated websites are also located on the same address, which seems to reinforce the idea that this is just a coincidence.

Other supposed “evidence” included similarities in the frontend code, pointing to similar names for some style files that share a common scheme of “main-chunk.css.”

Srinawakoon said that this is simply the result of both using the React framework, a very popular frontend development tool. He stated that similar naming schemes could be found in any React app.

Finally, some pointed out that the SSL certificate for both websites was issued by the same authority, Let’s Encrypt. This is once again common, with Cointelegraph itself using the same provider. Srinawakoon concluded:

“I hope this dispels some misconceptions from some people that try to associate Band with Sushiswap. As stated in our official response, while we may have helped them in the beginning, we are not the creator of Sushiswap nor have a stake in them.”

The identity of the SushiSwap founder remains unknown, and allegations raised so far appear to fall short of convincing. In the meantime the project appears to be gradually transitioning to a new, community-led ownership model.

Tags
Related Posts
‘No more rug pulls’: Project eliminates human involvement from token distributions
“A Polkadot project with a difference” says it is restoring trust and simplicity to complex token ecosystems and eliminating the centralized distribution models that can render the power of blockchain technology useless. Polkalokr offers a multi-chain token escrow platform that can be integrated into existing DeFi protocols, ensuring that network participants have full control over how tokens are distributed and treasuries are managed. The project’s goal is to remove human reliance and bring trust to token economies through governance-as-a-service — all while delivering security, scalability and a user-friendly experience. Explaining why Polkalokr is needed, the developers behind this initiative said: …
Technology / April 6, 2021
Fake Tokens on Uniswap Are Trying to Cash in on DeFi Hype
Scam tokens are a growing problem on the decentralized exchange and liquidity pool Uniswap — owing to the protocol’s open listing policy. In recent days warnings have been issued about scam tokens targeting four of the most buzz-worthy decentralized finance (DeFi) projects including Curve Finance, 1inchExchange, Tornado.Cash, and dYdX. With any token able to be listed on the platform’s drop-down menu simply by making a GitHub request, the platform’s users are increasingly calling for more stringent vetting to be introduced. Open listing policy leads to scam tokens Decentralized derivatives project Opium took to Twitter on July 7 to warn users …
Business / July 8, 2020
Smart contract standards: Making DeFi transactions on Ethereum more secure
Decentralized finance continues to make its impact on the crypto market, and with over $13 billion of total value of assets locked, DeFi projects are clearly resonating with eager crypto investors. Yet while the DeFi space has been progressing over the last year, a number of illegitimate projects have come to fruition, reminding some of the 2017 ICO boom and its subsequent bust. For example, Harvest Finance, a major decentralized protocol, was recently hacked. The attacker made away with $24 million from Harvest Finance pools. Most recently, Value DeFi, the decentralized finance protocol, fell victim to a $6-million flash loan …
Blockchain / Nov. 21, 2020
'Haunts me to this day' — Crypto project hacked for $4M in a hotel lobby
The co-founder of Web3 metaverse game engine “Webaverse” has revealed they were victims of a $4 million crypto h after meeting with scammers posing as investors in a hotel lobby in Rome. The bizarre aspect of the story, according to co-founder Ahad Shams, is that the crypto was stolen from a newly set up Trust Wallet and that the hack took place during the meeting at some point. He claims the thieves could not have possibly seen the private key, nor was he connected to a public WiFi network at the time. The thieves were somehow able to gain access …
Nft / Feb. 7, 2023
Top 7 cybersecurity jobs in high demand
In today’s digital age, cybersecurity has become a critical aspect of almost every business. Cyber threats are increasing daily, and businesses must take proactive measures to protect their networks and data. As a result, the demand for cybersecurity professionals has skyrocketed. Little Friday humour #meme #cybersecurity @hackurityio pic.twitter.com/MArEpCh03k — Harold De Vries (@devries_harold) February 17, 2023 In this article, we will discuss the top seven cybersecurity jobs that are in high demand. Cybersecurity analyst A cybersecurity analyst is responsible for identifying and mitigating cyber threats to an organization’s network and data. They examine system logs and network traffic to find …
Technology / Feb. 26, 2023