Advances in #Security and performance of #Blockchain systems - Good Read! 👀
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments 🤯 https://t.co/JQASdFGS4W
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments 🤯 https://t.co/JQASdFGS4W
Hindawi
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee.…
Advances in #Security and performance of #Blockchain systems - Good Read! 👀
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments 🤯 https://t.co/JQASdFGS4W
https://t.co/4L4T37s8oV
This paper proposes protection schemes and these schemes are evaluated by experiments 🤯 https://t.co/JQASdFGS4W
Hindawi
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee.…
A low-latency commit-and-reveal architecture to mitigate #Blockchain front-running - Good Read! 👀
PDF: https://t.co/n523G63SQj
https://t.co/Dxe1l0OF2D https://t.co/TljXUAFVaL
PDF: https://t.co/n523G63SQj
https://t.co/Dxe1l0OF2D https://t.co/TljXUAFVaL
Just spotted an awesome project for which Authors put together all known MITM (Man-In-The-Middle) attacks and methods of protection against these attacks 👀
https://t.co/yq2DMpJPDt
https://t.co/yq2DMpJPDt
GitHub
GitHub - frostbits-security/MITM-cheatsheet: All MITM attacks in one place.
All MITM attacks in one place. Contribute to frostbits-security/MITM-cheatsheet development by creating an account on GitHub.
Presented Caulk yesterday at the zkStudyClub.
Thanks, @AnnaRRose @apruden08!
(https://t.co/1ym3WFCm0u)
https://t.co/5arBCoEWyX
Thanks, @AnnaRRose @apruden08!
(https://t.co/1ym3WFCm0u)
https://t.co/5arBCoEWyX
YouTube
Caulk: zkStudyClub: Caulk - Lookup Arguments in Sublinear Time (Arantxa Zapico)
This week, Arantxa Zapico of the Ethereum Foundation presents new work (co-authored with Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, and Mark Simkin) called Caulk, which examines position-hiding linkability for vector commitment schemes.…
DarkSide - Tool Information Gathering & social engineering https://t.co/kWlYS1fOfL
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding #opensource #Linux #windows #DFIR #socialengineering #darkweb #osint https://t.co/rFlWxtqX21
#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #coding #opensource #Linux #windows #DFIR #socialengineering #darkweb #osint https://t.co/rFlWxtqX21
Hakin9 - IT Security Magazine
DarkSide - Tool Information Gathering & social engineering
DarkSide is a tool with an awesome user interface.
Cz:
Our threat intel detected a potential exploit on Uniswap V3 on the ETH blockchain. The hacker has stolen 4295 ETH so far, and they are being laundered through Tornado Cash. Can someone notify @Uniswap? We can help. Thanks
https://t.co/OV3g7ayf77
That was phishing 😫
Our threat intel detected a potential exploit on Uniswap V3 on the ETH blockchain. The hacker has stolen 4295 ETH so far, and they are being laundered through Tornado Cash. Can someone notify @Uniswap? We can help. Thanks
https://t.co/OV3g7ayf77
That was phishing 😫
Ethereum (ETH) Blockchain Explorer
Fake_Phishing5875 | Address 0x09b5027ef3a3b7332ee90321e558bad9c4447afa | Etherscan
The Address 0x09b5027ef3a3b7332ee90321e558bad9c4447afa page allows users to view transactions, balances, token holdings and transfers of ERC-20, ERC-721 and ERC-1155 (NFT) tokens, and analytics.
Denial-of-Service vulnerability of hash-based transaction sharding - Good Read! 🧐
PDF: https://t.co/pbf3KziZyW
https://t.co/CRpzEidYTf
PDF: https://t.co/pbf3KziZyW
https://t.co/CRpzEidYTf
Overcoming data availability attacks in #Blockchain systems - Good Read! 🧐
https://t.co/oTN1UO1ymP
Authors demonstrate that the EC-PEG algorithm coupled with a greedy sampling strategy improves the probability of detection of DA attacks 👀
https://t.co/oTN1UO1ymP
Authors demonstrate that the EC-PEG algorithm coupled with a greedy sampling strategy improves the probability of detection of DA attacks 👀
figshare
Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree
Light nodes in blockchains improve the scalability of the system by storing a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes accept…
If you're learning rust make sure you have the Ownership model down
Keep revisiting these resources until it sticks
Some Great Analogies to get you started
https://t.co/q38KkwvUS3
Deep Dive
https://t.co/33Q61DeEAK
For Readers - The Rust Book Ch 4
https://t.co/oFJWUiMspJ
Keep revisiting these resources until it sticks
Some Great Analogies to get you started
https://t.co/q38KkwvUS3
Deep Dive
https://t.co/33Q61DeEAK
For Readers - The Rust Book Ch 4
https://t.co/oFJWUiMspJ
YouTube
Learning Rust: Memory, Ownership and Borrowing
We go to some strange places in the computer...
* A rough model of the stack and heap.
* Copy and Cloning values
* The three rules of ownership
* Immutable and mutable borrows
* Slice borrowing
The Rust book: https://doc.rust-lang.org/book/second…
* A rough model of the stack and heap.
* Copy and Cloning values
* The three rules of ownership
* Immutable and mutable borrows
* Slice borrowing
The Rust book: https://doc.rust-lang.org/book/second…
Exploring #Web3 From the View of #Blockchain - Good Read! 🧐
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method 🤯 https://t.co/aKxA1QOgfM
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method 🤯 https://t.co/aKxA1QOgfM
Twitter
Exploring #Web3 From the View of #Blockchain - Good Read! 🧐
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method 🤯
https://t.co/bU0ucSDnDP
Authors have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method 🤯
All reentrarncy attack happened
https://github.com/ethereum/solidity/issues/12996#issuecomment-1187381059
https://github.com/ethereum/solidity/issues/12996#issuecomment-1187381059
GitHub
Language feature: disallow state-changing effects after an external call by default · Issue #12996 · ethereum/solidity
Abstract Generally disallowing state-changing effects after an external function call and enabling the possibility to mark functions that specifically do this. Motivation I started this discussion ...
A new high-performance approach to approximate pattern-matching for plagiarism detection in #NFTs- Good Read! 👀
arxiv.org/pdf/2205.14492…
Authors present an approach to performing approximate pattern-matching for plagiarism detection with using an NDFA-based approach 🤯
arxiv.org/pdf/2205.14492…
Authors present an approach to performing approximate pattern-matching for plagiarism detection with using an NDFA-based approach 🤯
Thirteen incredible #github repositories to help you learn everything about blockchain.
#Blockchain #web3 #development #defi #javadcript #solidity #vyper
https://twitter.com/poryadev/status/1549397403677388800?s=21
#Blockchain #web3 #development #defi #javadcript #solidity #vyper
https://twitter.com/poryadev/status/1549397403677388800?s=21
Behavior-aware account de-anonymization on #Ethereum interaction graph - Good Read! 🤯
👉https://t.co/hfGdoW4cZV
Authors propose an end-to-end graph neural network framework to characterize the behavior patterns of accounts and further achieve account de-anonymization 👀 https://t.co/sAkuWEZoXb
👉https://t.co/hfGdoW4cZV
Authors propose an end-to-end graph neural network framework to characterize the behavior patterns of accounts and further achieve account de-anonymization 👀 https://t.co/sAkuWEZoXb
Twitter
CIA Officer
Behavior-aware account de-anonymization on #Ethereum interaction graph - Good Read! 🤯 👉arxiv.org/pdf/2203.09360… Authors propose an end-to-end graph neural network framework to characterize the behavior patterns of accounts and further achieve account de…
Upgradeability of Smart Contracts on #Ethereum - Good Read! 👀
https://t.co/ibhnLCWjtY
Authors found 1.4 million proxy contracts which 8,225 of them are unique upgradeable proxy contracts 🤯 https://t.co/c24AfXc72w
https://t.co/ibhnLCWjtY
Authors found 1.4 million proxy contracts which 8,225 of them are unique upgradeable proxy contracts 🤯 https://t.co/c24AfXc72w
Twitter
Upgradeability of Smart Contracts on #Ethereum - Good Read! 👀
https://t.co/ibhnLCWjtY
Authors found 1.4 million proxy contracts which 8,225 of them are unique upgradeable proxy contracts 🤯
https://t.co/ibhnLCWjtY
Authors found 1.4 million proxy contracts which 8,225 of them are unique upgradeable proxy contracts 🤯
Critical #vulnerability in @compoundfinance live contracts was patched.
Discover it in our audit report, which can now be published unredacted chainsecurity.com/security-audit…
#opsec #web3security
Discover technical details in our blog medium.com/chainsecurity/… pic.twitter.com/CyBGvDzmI4
Discover it in our audit report, which can now be published unredacted chainsecurity.com/security-audit…
#opsec #web3security
Discover technical details in our blog medium.com/chainsecurity/… pic.twitter.com/CyBGvDzmI4
https://t.co/mbEFjv3KNq
Compound - REKT
Hack report
$147,000,000 | 09/29/2021
#web3security #web3 #development #javascript #DeFi #ETH #Ethereum #smartcontract
Compound - REKT
Hack report
$147,000,000 | 09/29/2021
#web3security #web3 #development #javascript #DeFi #ETH #Ethereum #smartcontract
rekt
Rekt - Compound - REKT
DeFi / Crypto - It’s worse than we thought. Last week ~$80M in excess COMP was wrongly distributed. Now another ~$68.8M has been sent to the vulnerable vault, and even more COMP is being given away.