WebGL. Or... how to draw a single point, the hard way.There are even harder ways...Jan 20, 2023·10 min read·216
Building skills for securing smart contracts.Reverse-engineering state storage, manipulating gas, hexadecimal math, zero code size contracts and more!May 12, 2022·23 min read·381
Ethernaut: accessing private data, denial of service, reentrancy attacks and dishonest contracts.Let's get straight to it. The vulnerabilities exploited on this installment are not trivial and can be particularly malicious. Specially the reentrancy attack at #10. 8th Challenge: Vault - accessing private data We will need to unlock the following ...May 8, 2022·7 min read·70
Ethernaut: Phishing tx.origin, Arithmetic Overflow, delegateCall, and forcibly sending Ether.Let's continue the Ethernaut with challenges 4 through 7. These are quite interesting and point out several of the basic vulnerabilities you should be aware of when writing smart contracts. :D 4th Challenge: Telephone - tx.origin phishing The goal is...May 7, 2022·6 min read·194
Ethernaut: Fallback, Fallout and winning a random game by predicting the future!This is fun!May 6, 2022·5 min read·167
How to (and why) go serverlessLearn with me how to (and why) build a FullStack app with AWS Amplify and Next.jsApr 21, 2022·20 min read·431
Here's an idea: An open-source asynchronous blockchain-powered freely-available officially-recognized decentralized CS degree.Throw in more buzzwords if you want. But I'm dead serious.Apr 21, 2022·10 min read·287