Web3ReadList
https://mixbytes.io/blog/modern-defi-lending-protocols-how-its-made-aave-v3 #defi AAVE v3 实现分析
mixbytes.io
Modern DeFi Lending Protocols, how it's made: the compilation
The summary article highlights new features and improvements in modern lending protocol implementations, drawing insights from previous articles.
👍3
https://mfkdf.com/
多因子密钥生成算法,感觉比较适合钱包私钥加密的场景
多因子密钥生成算法,感觉比较适合钱包私钥加密的场景
MFKDF2
Multi-Factor Key Derivation Function (MFKDF2) by Multifactor
The Next-Generation Multi-Factor Key Derivation Function (MFKDF2) is a function that takes multiple inputs and outputs a string of bytes that can be used as a cryptographic key. It serves the same purpose as a password-based key derivation function (PBKDF)…
👍1
Web3ReadList
https://pawelurbanek.com/revm-alloy-anvil-arbitrage 使用 REVM 模拟 #MEV 套利交易,给出了较为详细的优化方案
Paweł Urbanek - Ruby/Rust developer specializing in backend performance
How I've built an unprofitable Crypto MEV Bot in Rust
MEV bots are money-printing machines. At least in theory. For the last ~year, I've been working on the MEV crypto bot for Ethereum EVM-compatible chains. In this blog post, I'll describe the ins and outs of trying to get into the MEV game with a limited web3…
👍1
https://research.checkpoint.com/2024/wallet-scam-a-case-study-in-crypto-drainer-tactics/
drainer 项目 #security 详细分析
drainer 项目 #security 详细分析
Check Point Research
Wallet Scam: A Case Study in Crypto Drainer Tactics - Check Point Research
Key takeaways Introduction Crypto drainers are malicious tools that steal digital assets like NFTs, and tokens from cryptocurrency wallets. They often use phishing techniques and leverage smart contracts to enhance their impact. Typically, users are tricked…
👍2