Reality might be a Strange LoopExistence might be a self-explanatory cosmic version of “I am that I am.”May 104May 104
Reverse Engineering Inferno DrainerInferno Drainer is a widely used piece of JavaScript malware in web3 phishing campaigns. Its purpose is to drain the assets of phishing…Apr 17Apr 17
A brief analysis of Angel DrainerAngel drainer is a notorious piece of code used on web3 phishing sites. Its purpose is to extract the victim’s most valuable assets once…Apr 61Apr 61
Building a secure NFT gaming experience. A Herdsman’s diaryExperiences and learnings from my continuous security audit for Wolf Game.Dec 15, 20213Dec 15, 20213
Rage of the machine: An AI* makes metal musicIntroducing the latest album from the versatile metal genius DeepSlayerXL, with song reviews by GPT-3.Aug 8, 20214Aug 8, 20214
I asked GPT-3 for the question to “42”. I didn’t like its answer and neither will you.Can GPT-3 compute the ultimate question about life, the Universe and everything?Nov 24, 202063Nov 24, 202063
Catching weird security bugs in Solidity smart contracts with global invariant checksContract invariants are properties of the program program state that are expected to always be true. In my previous article I discussed…Mar 24, 2020Mar 24, 2020
Published inCoinmonksHow to become a cryptocurrency thought leader on TwitterThought leading is a complicated profession. Thanks to the emergence of cryptocurrency, it has also been one of the fastest growing fields…Jan 28, 2020Jan 28, 2020