Not anymore 💁♀️ This might seem long, but trust me it’s worth every scroll 😉 Let’s break it down...
What is a Reentrancy Attack? A reentrancy attack happens when a smart contract lets an attacker call...
When writing Solidity smart contracts, you often come across tx.origin and msg.sender so what’s the...
Phishing attacks are tricks used to fool people into doing things that can harm them, like sharing...
In Solidity, arithmetic overflow and underflow were common issues before version 0.8.0. Here's a...
In Solidity, arithmetic overflow and underflow were common issues before version 0.8.0. Here's a...
In Ethereum smart contracts, getting true randomness can be tricky and dangerous. Here’s why: The...
1/ Stablecoins are like the anchors of the cryptocurrency world. Just as a boat uses an anchor to...
I recently attended my first Devcon in Bangkok, and it was an amazing experience! 🌟 For those who...
Let’s break down how different transaction calls work in Ethereum, and how state changes happen using...
Let's break it down in simple terms👇: 1. Setup: When you send a transaction from your wallet to a...
Ever wondered how teams work together on computer projects without chaos?🤔 It's like having a super...