Reality might be a Strange LoopExistence might be a self-explanatory cosmic version of “I am that I am.”May 10, 20243May 10, 20243
Reverse Engineering Inferno DrainerInferno Drainer is a widely used piece of JavaScript malware in web3 phishing campaigns. Its purpose is to drain the assets of phishing…Apr 17, 2024Apr 17, 2024
A brief analysis of Angel DrainerAngel drainer is a notorious piece of code used on web3 phishing sites. Its purpose is to extract the victim’s most valuable assets once…Apr 6, 20241Apr 6, 20241
Building a secure NFT gaming experience. A Herdsman’s diaryExperiences and learnings from my continuous security audit for Wolf Game.Dec 15, 20213Dec 15, 20213
Rage of the machine: An AI* makes metal musicIntroducing the latest album from the versatile metal genius DeepSlayerXL, with song reviews by GPT-3.Aug 8, 20214Aug 8, 20214
I asked GPT-3 for the question to “42”. I didn’t like its answer and neither will you.Can GPT-3 compute the ultimate question about life, the Universe and everything?Nov 24, 202063Nov 24, 202063
Catching weird security bugs in Solidity smart contracts with global invariant checksContract invariants are properties of the program program state that are expected to always be true. In my previous article I discussed…Mar 24, 2020Mar 24, 2020
Published inCoinmonksHow to become a cryptocurrency thought leader on TwitterThought leading is a complicated profession. Thanks to the emergence of cryptocurrency, it has also been one of the fastest growing fields…Jan 28, 2020Jan 28, 2020
Published inCoinmonksAdvanced smart contract security verification in RemixThe Remix development environment integrates to MythX to provide users with a convenient and powerful way of checking the correctness of…Jan 28, 2020Jan 28, 2020
Published inGood AudienceBlockchain? Bah!Why the blockchain won’t be Nirvana.May 12, 20193May 12, 20193
Published inConsenSys DiligenceEthereum security tools built by ConsenSys DiligenceConsenSys Diligence is a security-focused group of 30+ Ethereum engineers, auditors and researchers distributed all over the world. We…Mar 29, 2019Mar 29, 2019
Published inConsenSys DiligenceDetecting critical smart contract vulnerabilities with MythXWhile Turing-complete smart contracts are awesome, the added flexibility also allows programmers to introduce many types of security flaws…Mar 26, 2019Mar 26, 2019
Published inHackerNoon.comTo fork or not to fork? Results of a Bitcoin and Ethereum community survey.“Hard fork” is a term that often leads to heated debates. Some communities explicitly embrace on-chain governance, such as freezing…Mar 20, 2019Mar 20, 2019
Published inConsenSys DiligenceThe tech behind MythX smart contract security analysisWhen I first introduced Mythril in 2017, I didn’t expect it to be very useful to smart contract developers. It was a simple symbolic…Mar 13, 20191Mar 13, 20191
Published inGood AudienceEthereum startups 2.0: How to turn the ICO model on its headThe 2016–2017 period will go down in history as the golden era of the ICO. Any project with a half-decent website and white-paper would…Feb 20, 2019Feb 20, 2019
Published inGood AudienceShowdown of stores of value: Bitcoin vs. CryptoKittiesThis is my second essay in a series of love letters to cryptocurrency maximalists. It is not investment advice. Take with a grain of salt…Feb 12, 20191Feb 12, 20191
Published inConsenSys MediaBringing mainstream e-commerce to the Ethereum blockchainAs part of #OperationSpring, a look at key factors that will enable widespread adoption of blockchain technologyJan 29, 20193Jan 29, 20193
Published inHackerNoon.comThe definitive guide to becoming a crypto maximalistThe first rule of maximalism is that there is no maximalism.Dec 23, 20184Dec 23, 20184