VCs need this kind of return in order to produce great funds.
Some gems from @MacConwell of @RarebreedVC in Clubhouse right now:
VCs need this kind of return in order to produce great funds.
Age doesn't matter. But just make sure no one is taking advantage of you. And as such, accelerators can help sometimes w that guidance.
Mac says he's been there and has heard that saltiness. But you're going to get a lot of nos. And you gain more leverage w more progress and traction. So just keeping going.
Mac recommends networking w the pitch organizers.
I'm not sure if it's clubhouse or my internet but I didn't quite catch any of this part.
their website!
Fwiw, I'm a (small) LP and highly recommend checking it out.
I missed most of the responses but I think the tl;Dr was that the founder should think about other travel mkts that are here - like road travel. And keep pitching!
Mac's go-to is honesty. He is direct and upfront w/ a founder. (And I concur!)
Not all vcs do this though.
More from Elizabeth Yin
More from Internet
SolarWinds follow up. Very good tweet explaining what happened.
Basically what this means is that SolarWinds itself was exploited. Someone posted an infected update as legitimate (digitally signed), leading customers to download a bad update.
“Multiple trojanized updates were digitally signed from March - May 2020 and posted to the SolarWinds updates website” https://t.co/8e3bMFWXYu
FireEye then explains that infected organizations were approached and exploited. This is a separate Step 2.
At this point, information is already going to “malicious domains” without extra intervention, after the malware does nothing for “up to two weeks”
Hackers reportedly slipped malware into prior SolarWinds software updates, which gave them access to a "God-mode" for infected networks, including the Treasury and Commerce departments.
— Wes Wilson (@weswilson4) December 14, 2020
The Pentagon is also a SolarWinds customer.https://t.co/Srcoztssol https://t.co/OgMhAjJqPx
Basically what this means is that SolarWinds itself was exploited. Someone posted an infected update as legitimate (digitally signed), leading customers to download a bad update.
“Multiple trojanized updates were digitally signed from March - May 2020 and posted to the SolarWinds updates website” https://t.co/8e3bMFWXYu

FireEye then explains that infected organizations were approached and exploited. This is a separate Step 2.
At this point, information is already going to “malicious domains” without extra intervention, after the malware does nothing for “up to two weeks”
