Archives
Secure your Dapp or join the REKT database
A checklist of security activities to prevent being the next one on the list
Christopher Von Hessert
Risk mitigation strategies for node validators
We present a summary of large slashing events and discuss why such general security certifications a...
Sebastian Banescu
Securing Your Self Custody
In this presentation, Webacy CEO Maika Isogawa address three unique topics on self-custody. Through ...
Maika Isogawa
Security doesn’t stop at code complete
There’s more to smart contract security than writing code. We’ll explore the essential roles deploym...
Dan Mckeon
Threshold Signature for Mass: Benchmarking & Usability Study
With aim of mass adoption, investigated the scalability and usability of constructs of MPC Threshold...
Jay Prakash
Research on EIP Security Specifications
Summarize the safety issues found in the process of existing EIP proposals, and provide guidance and...
Mirror Tang
Smart Firewalls: The new dApp defenders
Overview of the cybersecurity threats while understanding them better. Knowladge is power - use it t...
Or Dadosh
How to understand a hack
Hacks are the best teachers about the vulnerabilities that matter most - the ones that get past tool...
Daniel Von Fange