fromHackernoon4 years agoPrivacy technologiesBuilding with Midnight: Privacy for Devs, Not Just Suits | HackerNoon
fromBusiness Matters1 week agoCryptocurrencySmart Contracts and Instant Payouts: Are UK Startups Ready for On-Chain Escrow?
fromHackernoon1 year agoDigital lifeA Technical Breakdown of Blockchain, Ethereum Smart Contracts, and Intel SGX | HackerNoon
fromHackernoon1 year agoCryptocurrencyLayer-One Confidential Smart Contracts: Architecture, Threats, and Tradeoffs | HackerNoon
fromHackernoon1 year agoCryptocurrencyHow Trusted Execution Environments Power Scalable, Private Smart Contracts | HackerNoon
fromHackernoon1 year agoArtificial intelligenceTo Fix Smart Contracts, Start With Their Secrets | HackerNoon
fromHackernoon4 years agoPrivacy technologiesBuilding with Midnight: Privacy for Devs, Not Just Suits | HackerNoon
fromBusiness Matters1 week agoCryptocurrencySmart Contracts and Instant Payouts: Are UK Startups Ready for On-Chain Escrow?
fromHackernoon1 year agoDigital lifeA Technical Breakdown of Blockchain, Ethereum Smart Contracts, and Intel SGX | HackerNoon
fromHackernoon1 year agoCryptocurrencyLayer-One Confidential Smart Contracts: Architecture, Threats, and Tradeoffs | HackerNoon
fromHackernoon1 year agoCryptocurrencyHow Trusted Execution Environments Power Scalable, Private Smart Contracts | HackerNoon
fromHackernoon1 year agoArtificial intelligenceTo Fix Smart Contracts, Start With Their Secrets | HackerNoon
fromHackernoon2 weeks agoCryptocurrencyStop Calling Ethereum 'Crypto Silver'-It's So Much More | HackerNoon
fromHackernoon1 month agoCryptocurrencyAVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon
fromHackernoon1 month agoDigital lifeA New Tool Uncovers Over $11.2 Billion at Risk in Ethereum Smart Contracts | HackerNoon
Software developmentfromHackernoon1 month agoHow Ethereum Opcodes Handle Memory, Calls, and Control Flow | HackerNoonThe EVM Simulator updates data structures and taint information in Ethereum smart contracts through opcode management and user-variable tracking.
E-CommercefromHackernoon1 month agoInside Ethereum's Smart Contract Ecosystem: Security, Tokens, and Whitelist Verification | HackerNoonEthereum includes External Owned Accounts and smart contracts, allowing decentralized applications to execute code and handle transactions.
fromHackernoon2 weeks agoCryptocurrencyStop Calling Ethereum 'Crypto Silver'-It's So Much More | HackerNoon
fromHackernoon1 month agoCryptocurrencyAVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon
fromHackernoon1 month agoDigital lifeA New Tool Uncovers Over $11.2 Billion at Risk in Ethereum Smart Contracts | HackerNoon
fromHackernoon1 month agoSoftware developmentHow Ethereum Opcodes Handle Memory, Calls, and Control Flow | HackerNoon
fromHackernoon1 month agoE-CommerceInside Ethereum's Smart Contract Ecosystem: Security, Tokens, and Whitelist Verification | HackerNoon
fromMedium3 weeks agoBuilding a Multi-Election Ballot Smart Contract on the Blockchain with SolidityData structures for voter, proposal, and election are defined to manage a decentralized voting application.
CryptocurrencyfromBitcoin Magazine3 weeks agoRGB V0.11.1 Launches, Allowing The Creation Of Digital Assets On Bitcoin MainnetRGB v0.11.1 enables the issuance and management of digital assets on Bitcoin and the Lightning Network.
fromHackernoon1 year agoWhy Maestro's Indexer Could Be the Missing Link for Bitcoin DeFi on ICP | HackerNoonMaestro is creating an on-chain system to index Ordinals and Runes, two emerging Bitcoin metaprotocols, inside ICP canisters.Cryptocurrency
E-CommercefromHackernoon1 month agoHow to Find Smart Contract Vulnerabilities Before Exploit Happen | HackerNoonAVVERIFIER serves as a real-time detector of vulnerabilities in smart contracts.
fromHackernoon1 month agoCryptocurrencyA Static Taint Analyzer for Address Verification Vulnerabilities in Ethereum | HackerNoon
fromHackernoon1 month agoSoftware developmentHow a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon
fromHackernoon1 month agoCryptocurrencyA Static Taint Analyzer for Address Verification Vulnerabilities in Ethereum | HackerNoon
fromHackernoon1 month agoSoftware developmentHow a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon
fromTheregister1 month agoAt last, a promising use for AI agents: crypto theftAI agents can autonomously exploit vulnerabilities in smart contracts, presenting a lucrative but potentially illegal business model.
fromHackernoon2 years agoGrowth hacking1inch Rolls Out Expanded Bug Bounties With Rewards Up To $500K | HackerNoon
fromHackernoon1 year agoCryptocurrencyR0AR Introduces Unified DeFi Platform For Token, Liquidity, And NFT Staking | HackerNoon
fromHackernoon2 years agoGrowth hacking1inch Rolls Out Expanded Bug Bounties With Rewards Up To $500K | HackerNoon
fromHackernoon1 year agoCryptocurrencyR0AR Introduces Unified DeFi Platform For Token, Liquidity, And NFT Staking | HackerNoon
Marketing techfromForbes2 months agoWeb3 Advertising Trends For 2025Web3 advertising is projected to grow significantly, driven by blockchain technologies.
fromHackernoon3 months ago9 Quadrillion Reasons Web3 Still Isn't Ready | HackerNoonMobius essentially lost $2 million due to a simple copy-paste error in its smart contract, revealing serious lapses in Web3's approach to financial software.Cryptocurrency
fromHackernoon4 months agoFive Ways Your Favorite Stablecoin Could Totally Fall Apart | HackerNoonStable derivatives are vulnerable to blockchain issues, oracle inaccuracies, and smart contract vulnerabilities, impacting their intended stability.