Using Proxies: An Essential Guide
A practical guide to safe choices and best practices when deploying proxies for a project
A practical guide to safe choices and best practices when deploying proxies for a project
Disclosure of a new unbundling attack on MEV relays, and associated mitigations
Analysis of Attestation Packing Efficiency throughout time.
Lighthouse on macOS: beginners tutorial.
A rogue key attack on Gennaro et al. DKG for polynomials of excessive degree, allowing full control of the private key
This post shares with the public details of a security review performed by Sigma Prime, which targeted an Ethereum Name Service (ENS) registrar developed by Status.
Introduction to Rust security and fuzzing, with particular focus on our ethereum 2.0 client, lighthouse.