A practical guide to safe choices and best practices when deploying proxies for a project
A rogue key attack on Gennaro et al. DKG for polynomials of excessive degree, allowing full control of the private key
Beacon Fuzz - Update #09
Beacon Fuzz - Update #08
Beacon Fuzz - Update #07
Beacon Fuzz - Update #06
We're hiring blockchain security engineers
We're hiring an executive assistant
Beacon Fuzz - Update #05
Beacon Fuzz - Update #04
Beacon Fuzz - Update #03
Beacon Fuzz - Update #02
Beacon Fuzz - Update #01
Beacon Fuzz Update #00
This post shares publicly the details of a security assessment conducted by Sigma Prime, which targeted an Ethereum smart contract wallet developed by Dapper Labs.
This post shares with the public details of a security review performed by Sigma Prime, which targeted an Ethereum Name Service (ENS) registrar developed by Status.
A comprehensive discussion and derivation of RSA cryptography, including the generalisation to multiple primes.
A definition of purity in the Ethereum EVM with strategies for detecting purity on-chain.
This post aims to be a relatively in-depth and up-to-date introductory post detailing the past mistakes that have been made by Solidity developers in an effort to prevent future devs from repeating history.
This article provides an accessible explanation of the "proof-of-work" consensus algorithm as used in Bitcoin, Ethereum and many other cryptocurrencies.
Overview of the Equihash mining algorithm and potential mathematical optimisation thought experiments.