weblogs

Heard about the XYZ hacks yet? Losses in millions but couldn't find what actually happened? We have you covered, read out the revealing, intricate and statistical intelligence about blockchain security and cybersecurity.

    featured weblog

    Web2 Security vs Web3 Security: An Innovative Adaptation?

    Web 3.0 is a semantic web where it promises to establish information in a better-existing way than any current search engine can ever attain. Web 3.0 promotes four concepts which mainly are authenticity, i.e, every piece of information existing on the internet is a fact or derived from a fact. Integrity, willingness to abide by moral principles, and ethical values. Transparency, the data present on the internet is accessible for every user to witness. Lastly, Confidentiality which is achieved by Blockchain technology, where every user’s identity is anonymous, making it secure. 

    More Weblogs

    Web2 Security vs Web3 Security: An Innovative Adaptation?

    Web 3.0 is a semantic web where it promises to establish information in a better-existing way than any current search engine can ever attain. Web 3.0 promotes four concepts which mainly are authenticity, i.e, every piece of information existing on the internet is a fact or derived from a fact. Integrity, willingness to abide by moral principles, and ethical values. Transparency, the data present on the internet is accessible for every user to witness. Lastly, Confidentiality which is achieved by Blockchain technology, where every user’s identity is anonymous, making it secure. 

    A Security Framework For Blockchain Applications

    When creating a blockchain application it is really essential that all the security measures are taken into account.

    How Can a VPN Protect You From Spying?

    VPN uses a private network that helps users mask their surfing history on the internet, hackers even advertisers can’t steal the data and use it for their means. 

    Smart Contract Security Audit: An Auditor's Interrogation

    A comprehensive introduction to smart contract security audit and preparation of relevant interview questions.

    Cast Storage

    Lets understand the smart contract storage model in Ethereum and EVM-based chains and how you can access the public and private variables of any smart contract deployed on the blockchain. We can do this by using cast storage.

    Curve Finance Hacked, $570k Stolen!

    On Tuesday, 9th August, Curve Finance suffered from a DNS attack causing theft of a whooping $570,000+ USD.  Curve Finance is a stablecoin decentralized exchange (DEX) that runs on the Ethereum blockchain.  The attacker targeted the front end where the suspected hacker appears to have changed the domain name system (DNS) entry for the protocol, […]

    GameFi: Future of Gaming or Short-lived Gimmick?

    On the surface, the GameFi industry sounds revolutionary. However, digging a little deeper reveals several questions about its legitimacy. What are the risks associated with its play-to-earn model? Are all games which claim to be a part of GameFi credible? And, at the end of the day, is this a viable direction for gaming, or nothing more than a short-lived gimmick?

    Consumer Privacy & Data Breach Part II - Is Web 3.0 The Cure?

    When the dot-com bubble burst, the technology modifications accelerated, and web 1.0 transformed into web 2.0. User-generated content took a boom, that allowed users to interact with the content and share their thoughts. But, the happiness wasn’t long-lived, the people soon realized that their information is being tracked and used for target marketing.

    Harvest Finance Hack Analysis & POC

    Harvest finance got hacked for around $34M due to a flashloan attack which manipulated the price in the Curve pool to retrieve more USDT tokens than originally deposited USDT amount in fUSDT pool.

    1 2 3 5
    Designed & Developed by: 
    All rights reserved. Copyright 2020-21