Revisiting Ethereum Classic in Light of the London Hard Fork

Revisiting Ethereum Classic in Light of the London Hard Fork

The successful upgrade of the London Hard Fork is a big difference from the fork leading to Ethereum Classic that took place back in 2016. However, despite their divergence, both are milestones in the Ethereum world- guaranteed to have lasting impacts on the blockchain as we know it. Read more to find out the circumstances surrounding each hard fork and the role they may play in shaping Ethereum’s future.

Bitcoin Halving 2024: Economic Dynamics And Market Perspectives

Bitcoin Halving 2024

“The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.” As the countdown to the quadrennial Bitcoin halving event begins, the sense of anticipation is immense among cryptocurrency enthusiasts and the Web3 community, especially with Bitcoin’s valuation already surpassing its previous all-time high by a notable 6.5%. This event is more than just a […]

Web 3 Trick or Treat? A practical guide to prevent Phishing Scams and Hacks

Web 3 Trick or Treat A practical guide to prevent Phishing Scams and Hacks

It was through a simple PDF and a fake job offer that the biggest heist in crypto history took place in 2022 when Ronin Bridge lost an astounding $624 million. The year 2023 saw a 65.3% increase in Web3 security incidents compared to 2022, with 110 new incidents recorded. In the burgeoning world of decentralized […]

Privacy Pools – Striking the Balance in Privacy and Regulations

Privacy Pools – Striking the Balance in Privacy and Regulations

Public blockchains represent a paradigm shift in digital transactions, offering a transparent and decentralized ledger accessible to anyone. However, this very transparency can present privacy challenges. One notable concern is the exposure of transaction history associated with public addresses. When you conduct a transaction on a public blockchain, the details are recorded on the ledger, […]

A Primer for the Zero-Knowledge Cryptography: Part II

A Primer for the Zero-Knowledge Cryptography Part II

Introducing the initial building block: the Elliptic curve DLP primitive. Subsequently, in the forthcoming series, we will delve into other primitives such as Bilinear mapping, Knowledge of exponentiation, and groups of unknown orders.

Decoding the ERC-2771 Delegatecall Vulnerability

Decoding the ERC-2771 Delegatecall Vulnerability

ERC-2771 is a protocol designed for authenticating users in transactions relayed through a third party. It plays a pivotal role in reducing transaction costs and streamlining operations on the blockchain. However, this convenience comes with a hidden risk.

A Primer for the Zero-Knowledge Cryptography III

A Primer for the Zero-Knowledge Cryptography III

In the previous edition of the ZK cryptography series, we thoroughly explored the fundamentals of our first computational problem DLP with its application in the Elliptic curve for higher security guarantees in ZK proofs.

Stablecoins: Riskless Investment or Financial Fraud?

Stablecoins Riskless Investment or Financial Fraud

On the surface, stablecoins sound like a dream come true for crypto investors. However, digging a little deeper raises several questions about their backing. At the end of the day, can the companies selling them even be trusted?

The Big Fuzz Theory: The Dark Fuzz Rises

The Big Fuzz Theory The Dark Fuzz Rises

Learn how Fuzz Driven Development (FDD) transforms software testing by assisting programmers and testers in overcoming prejudices for improved code quality, security, and performance.

Clients & Partners
0 +
Clients & Partners
0 +

    Access the
    Audit Checklist

    Clients & Partners
    0 +
    not sure where to start?