ContentPosts from @dawnalvarez494..
Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Block Trading is Live: CEX Liquidity Directly from your Self Custodial Wallet on L2

Loopring introduces access to major CEX liquidity directly, allowing for good liquidity and low slippage without the risk of fund centralization. This block trading feature has a process similar to traditional stock markets, where transactions occur outside of the open market through private purchas.. read more  

Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Post-Mortem Report: Ethereum Mainnet Finality (05/11/2023)

Ethereum's mainnet network suffered lack of block production leading to a temporary delay in epoch finalization. Two incidents caused approximately 200 blocks to be missed, with a lack of finality, resulting in inactivity penalties and an estimated loss of revenue for block producers. Validator slas.. read more  

Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Don't overload Ethereum's consensus

Blockchain communities rely on a fragile social consensus. While necessary for upgrades and security, it should be used sparingly to avoid chain splits. Expanding the blockchain's core functionality makes it more vulnerable. Application-layer projects should be cautious about broadening consensus be.. read more  

Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Distributed Sequencer Technology — A Path to Decentralized Sequencing

The scalability issue with Ethereum is being tackled with rollups, although decentralized sequencers are needed to ensure sufficient decentralization in the network, and the use ofdistributed validator technology (DVT)may be a viable solution. The proposed DVT approach distributes responsibility amo.. read more  

Distributed Sequencer Technology — A Path to Decentralized Sequencing
Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Tiny Bitcoin Miner Plays The Lottery

A Bitcoin miner built around a Raspberry Pi has a tiny chance of winning the reward, as participating in Bitcoin mining requires an array of computers to solve complex math algorithms. This method is popularly known as "lottery mining" and requires configuration and wallet information to contribute .. read more  

Tiny Bitcoin Miner Plays The Lottery
Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Smart Contract Security: A 2023 Survey

Smart Contract Security - A mini course on smart contract security, providing a list of issues and vulnerabilities that recur in Solidity smart contracts... read more  

Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

How To Find XSS Vulnerabilities In NFT Marketplaces

When most people think about web3 security, they think about smart contracts holding hundreds of millions of dollars of funds. But web3 security is much broader than that. This article explores the intersection between web2 and web3 in NFT marketplaces, and how you can find Cross-Site Scripting (XSS.. read more  

Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

6 security sins of Web3 bridges

Bridge exploits account for ~50% of all DeFi exploits since September 2020, totaling ~$2.5B in lost assets, according to the Token Terminal. Ever since chain interoperability has become a hot topic, Web3 bridges became a popular target for hackers. This is due to the nature of Web3 projects (open-so.. read more  

6 security sins of Web3 bridges
Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Legion Malware Upgraded to Target SSH Servers and AWS Credentials

An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services (AWS) credentials associated with DynamoDB and CloudWatch... read more  

Legion Malware Upgraded to Target SSH Servers and AWS Credentials
Link
@faun shared a link, 2 years, 10 months ago
FAUN.dev()

Credential harvesting tool Legion targets additional cloud services

Legion hacker, a commercial malware tool, has widened its scope in targeting cloud services and can now compromise SSH servers and steal additional AWS-specific credentials, according to security firm Cado Security. The tool's main goal is to harvest credentials and store configuration files. Atta.. read more  

Credential harvesting tool Legion targets additional cloud services