Jorch's Mini Blog

Jorch's Mini Blog

Follow
homeSponsor Me!Will Code 4 FoodAbout MeWriting Everyday!Algarabia Mathematicabadgesnewsletter
Tag

Web3

#web3

More content

Read more stories on Hashnode


Articles with this tag

Ethernaut: accessing private data, denial of service, reentrancy attacks and dishonest contracts.

May 8, 20227 min read 54 views

Let's get straight to it. The vulnerabilities exploited on this installment are not trivial and can be particularly malicious. Specially the...

Ethernaut: accessing private data, denial of service, reentrancy attacks and dishonest contracts.

Ethernaut: Phishing tx.origin, Arithmetic Overflow, delegateCall, and forcibly sending Ether.

May 7, 20226 min read 154 views

Let's continue the Ethernaut with challenges 4 through 7. These are quite interesting and point out several of the basic vulnerabilities you should be...

Ethernaut: Phishing tx.origin, Arithmetic Overflow, delegateCall, and forcibly sending Ether.

Here's an idea: An open-source asynchronous blockchain-powered freely-available officially-recognized decentralized CS degree.

Apr 21, 202210 min read 277 views

Throw in more buzzwords if you want. But I'm dead serious. ยท Before we begin. I don't use buzzwords for buzzword's sake. Let me give you a run down of...

Here's an idea: An open-source asynchronous blockchain-powered freely-available officially-recognized decentralized CS degree.