Recently I asked for an advice about how to overcome afternoon sleepiness 😴 and I got lots of replies.
Here is the breakdown of the most popular and most common recommendations I got.
The last one was the most recommended one.
1/ Be mindful about your coffee intake.
It’s best not to take it right after you wake up, and few hours before you go to sleep.
It’s better to get sunlight ☀️ in the morning before your first cup of that delicious coffee ☕️
Jan 3, 2023 • 26 tweets • 14 min read
Now that a new year has begun, it's time to pick one resolution that will completely change your life.
I've got a suggestion for you.
Join the club of top hackers and become a Web3 Bug Bounty Hunter in 2023 🐞⚔️
To find out how, read this thread 🧵
Strong foundations 🏛️ are the key in every aspect of life and career. For Web3 it doesn't matter if you want to become a dev, a hacker or a journalist.
You need to understand the Blockchain in depth. With that knowledge you will be able to understand more complex topics.
Jul 23, 2022 • 27 tweets • 7 min read
What are the most common smart contracts vulnerabilities?🧐
Many of the examples will be well known to people familiar with the web3 security.
What makes this interesting, is how common these vulnerabilities are even after many hacks involving them!🫥
Let's dive in!🧵👇
I divide vulnerabilities into three main types:
• Unsafe External Calls
• Usage of spot-price
• Authentication issues
These three definitions are an umbrella☂️types that contains variations of these types of bugs🐛
Let's understand the first one and show some examples 🥷🔓
Jul 17, 2022 • 25 tweets • 6 min read
Let's talk Cross-Chain Bridges.
The demand for moving gained/earned assets on one network to another increases every day.
The amount flowing through bridges is enormous.
There is currently over $80.4B in TVL in various DeFi protocols.
So...how secure are blockchain bridges?
Before we talk security, we need to understand how in general cross-chain bridges works.
One thing you need to remember about bridging: assets cannot be transferred across chains.
The primary chain maintains ownership, and the user is given a debt token on the secondary chain.
Apr 27, 2022 • 4 tweets • 6 min read
🧶Here's the list of Web3 resources for security that you recommended few days ago.
Positions on the list are random 🎲
Don't treat this list as final🚨
It's just resources you shared with me. If you think there should be something else on the list, comment 👇
This should give you a great overview of inner workings of Ethereum.
Next, Solidity!🐍
Nov 25, 2021 • 11 tweets • 2 min read
(1/n) Ethereum, while being an extremely versatile blockchain, still has significant usability constraints.
Ethereum has trouble with scaling, that is, handling an increasing number of transactions.
And there have been some remarkable scaling solutions to alleviate this.
👇🧵
(2/n) The current Ethereum version has low transaction throughput and high latency in processing.
This means that transactions are both slow and prohibitively expensive. 🐢 💸
There are two general types of scaling solutions proposed for the above issues
On-chain and Off-chain
Jun 24, 2021 • 15 tweets • 4 min read
1/ Do you think ERC20 approve() is safe? Well… 🧵
Function in itself is safe but there are two scenario where ERC20 approve() shows its rough edges.
First is a front-running attack on approve().
Imagine following scenario 👇
2/ * Alice approves Bob for 20 Tokens
* After some time, Alice changes approve to 10
* Bob front-runs the Alice TX for approve(10)
* Bob spends 20 Tokens
* Alice TX passes
* Bob spends additional 10 Tokens from Alice.
The exploit was possible due to a bug in emergencyBurn() function of ElevenNeverSellVault.
There is a transfer of previously deposited funds during the function call, but there is a lack of burning of Nerve shares to account for the transfer 2/ In other words, an attacker could double-spend Nerve shares he acquired during initial deposit to the vault.
emergencyBurn() didn’t burn 11NRV Tokens so an attacker used them in “withdrawAll()” to get additional LP Tokens in return.
Currently many of the Chinese provinces where Bitcoin miners resided, rolled out new policies restricting or banning the #BTC miners.
Inner Mongolia, Xinjiang, Yunnan and Sichuan banned Bitcoin.
2/ Energy companies were told to stop providing energy to crypto miners due to them using too much electricity.
It became an illegal activity to mine cryptocurrencies. If someone would be found to do so regardless, they would be added to the blacklist of social credit system.