Protect your crypto. Don't trust, verify.
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
IPFS and its progressive role in blockchain, cryptocurrencies, and Web3
You may have heard about ENS on Ethereum or NFT metadata on Solana. These things are united by IPFS — InterPlanetary File System, a Web3…
Find out more about IPFS and its applications in the blockchain industry:
▶️ Read on Medium: IPFS and its progressive role in blockchain, cryptocurrencies, and Web3
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
Selectors guide the EVM to execute the right function of your code. So what are selectors? Let’s dive in.
Selectors are 4-byte identifiers that tell the EVM which function to call, so selectors are critical for contract execution.
🔍 Visibility matters. Selectors are intended for use by external contracts, so only public & external functions have selectors, as they’re callable externally via the ABI. Internal & private functions don’t have selectors as they are not needed.
🔢 How to derive the selector? First, you'll need the function signature. In Solidity, signature is a string that represents the function name plus its parameter types (not names). To calculate the selector, you should hash the function signature with the Keccak-256 algorithm and take the first 4 bytes. That’s it ✨
An example: for
balanceOf(address), the Keccak-256 hash starts with 0x70a08231b98ef4ca…, so the selector is 0x70a08231🛠 Why care? Selectors enable function dispatching, common standards and contract compatibility, and gas-efficient calls. Selectors are also vital for low-level calls.
Understanding selectors is useful for a better understanding of Ethereum smart contract execution and efficient blockchain development 💻
Please open Telegram to view this post
VIEW IN TELEGRAM
Macworld
Complete list of Mac viruses, malware and trojans
Wondering how many viruses exist for the Mac? Here is a list recent Mac malware attacks, viruses for Apple computers, and security threats that Mac users have suffered
This is a classic myth, Mac and iPhone malware thrives, so be vigilant
▶️ An article with the list of Mac viruses, malware and trojans
Always protect your devices and assets
Please open Telegram to view this post
VIEW IN TELEGRAM
Forbes
16 Billion Apple, Facebook, Google And Other Passwords Leaked
As 16 billion credentials are confirmed as having been leaked, is it time to switch from passwords to passkeys?
▶️ Forbes: 16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now
To stay safe online, set strong unique passwords, enable 2FA, monitor suspicious activity
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
What are linters and how can they help in blockchain and crypto development
Code quality is one of the topics that many devs talk about, including (or perhaps especially) in blockchain and crypto development…
And linters are a powerful tool for increasing quality of your smart contract code.
Discover the benefits of using linters to improve coding efficiency, security, and readability 👇
▶️ Read on Medium: What are linters and how can they help in blockchain and crypto development
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
rekt
Rekt - Dodging a Bullet
DeFi / Crypto - No funds lost. No chaos. Just a whitehat report, a five-day fix, and a protocol that treated security like engineering - not damage control. Vesu did everything right… which is exactly why no one’s talking about it.
This is a success story: a crypto project actually prevented losses by implementing coordinated blockchain security measures👇
Read an article: DODGING A BULLET
Proactive security measures are always a best practice
Please open Telegram to view this post
VIEW IN TELEGRAM
Kaspersky
SparkKitty: a new stealer in the App Store and Google Play
The SparkKitty Trojan steals photos from Android and iOS users' galleries.
Trojan steals sensitive data such as seed phrases from user screenshots.
▶️ Read an article: Your cat pics are at risk: the threat posed by the new SparkKitty Trojan
Please open Telegram to view this post
VIEW IN TELEGRAM
Akamai
Cryptominers’ Anatomy: Shutting Down Mining Botnets | Akamai
In the final installment of Cryptominers’ Anatomy, Akamai researchers analyze cryptominers and reveal a novel technique to shut down mining botnet campaigns.
▶️ Read the article: Cryptominers’ Anatomy: Shutting Down Mining Botnets
Please open Telegram to view this post
VIEW IN TELEGRAM
➡️ In the big-endian the ‘big’ end (most significant byte or MSB) comes first. For example, the number 0x1234 will be stored 'as is', 12 34. Big-endian is commonly used in network protocols, for example in TCP/IP.
⬅️ In the little endian the ‘little’ end (least significant byte or LSB) comes first. So, 0x1234 will be stored in memory as 34 12. Little-endian is used in modern processor architectures.
So, big-endian vs. little-endian example:
Take the number 0xDEADBEEF:
- Big-endian: DE AD BE EF
- Little-endian: EF BE AD DE
Why care in blockchain & crypto? We use different machines and protocols to store and transfer the data. The order of bytes affects how data is hashed, signed or transmitted. To create a solid and secure blockchain ecosystem, it is important to take care of endianness.
Be mindful of the endianness and double-check protocol specifications to ensure a consistent data flow across your Web3 system 🚀
Please open Telegram to view this post
VIEW IN TELEGRAM
Cryptonews
Trezor Issues Urgent Alert Over Support-Form Phishing Attack
Trezor issues urgent security alert after hackers exploited support contact form to send phishing emails to users.
Read the article about the incident: Trezor Issues ‘Urgent Alert’ After Support-Form Exploit Sends Phishing Emails – What Users Must Know
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Frontend / supply chain attacks in crypto and what to do about it
When it comes to blockchain project security, what project areas do you consider first for protection? Most likely you thought of smart…
Supply chain attacks due to lack of frontend security.
It is time to speak up and take frontend security seriously in the blockchain / Web3 industry👇
▶️ Read the article on Medium: Frontend / supply chain attacks in crypto and what to do about it
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥1🔥1👏1 1
BleepingComputer
Google fixes fourth actively exploited Chrome zero-day of 2025
Google has released emergency updates to patch another Chrome zero-day vulnerability exploited in attacks, marking the fourth such flaw fixed since the start of the year.
Read an article: Google fixes fourth actively exploited Chrome zero-day of 2025
Time to update your Chrome
Please open Telegram to view this post
VIEW IN TELEGRAM
Avoid these popular traps like lack of proper checks, clicking phishing links, saving seeds in screenshots.
Play, learn, & stay safe
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Understanding MEV attacks
One of the key drivers of blockchain protocol stability is MEV (Miner or, more modernly, Maximum Extractable Value) — the profit a miner…
Our latest article dives into MEV attacks, their impact on DeFi, and solutions to ensure integrity in Web3 👇
▶️ Read the article on Medium: Understanding MEV attacks
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
What’s Anchor? It’s a Rust framework for Solana that cuts boilerplate & boosts productivity. Offers declarative syntax, auto account validation, TypeScript bindings, and more. Perfect for DeFi, NFT, or quick prototyping.
Native Rust gives you full control over Solana programs. You handle accounts, serialization & CPI manually. Ideal for custom logic or performance-critical apps, but needs deep Solana knowledge.
Anchor’s edge:
🔸 Less code with macros
🔸 Built-in basic security checks
🔸 Testing framework & TS support
Downside? Less flexibility for niche use cases.
Native Rust’s strengths:
🔸 Ultimate flexibility
🔸 Fine-tuned performance
But, you’ll write more code & handle security yourself. Risky if you miss a check. Best for low-level protocols.
When to use Anchor?
- New to Solana
- Building DeFi / NFT
- Want fast dev & safety
When to use native Rust?
- Need custom logic
- Performance is critical
- You’re a Solana pro or interested in becoming one 😎
In sum:
Want to dive deeper?
▶️ Check Anchor docs: https://anchor-lang.com
▶️ or Solana docs: https://docs.solana.com
Please open Telegram to view this post
VIEW IN TELEGRAM
Cointelegraph
Bitcoin Depot discloses data breach that doxed 27K customers
Crypto ATM operator Bitcoin Depot has told its users that a data breach mid-last year exposed 27,000 of its customers' information, which it only disclosed this week due to a federal investigation.
▶️ Read an article: Bitcoin Depot discloses data breach that doxed 27K customers
The breach compromised names, phone numbers, and driver’s license numbers, and may have also exposed addresses, birth dates, and emails
Please open Telegram to view this post
VIEW IN TELEGRAM
ReversingLabs
Malicious pull request infects VS Code extension | ReversingLabs
ETHcode, a VS Code extension for Ethereum smart contract development, was compromised following a GitHub pull request.
▶️ Read an article: Malicious pull request infects VS Code extension
Stay vigilant & update extensions manually
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
What is entropy illusion vulnerability?
Blockchain systems offer great opportunities for projects and devs, but like any other system, they have a number of certain limitations…
Know more about pseudo-randomness and entropy illusion vulnerability in our recent article
▶️ Read on Medium: What is entropy illusion vulnerability?
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
wiz.io
Soco404: Multiplatform Cryptomining Campaign | Wiz Blog
Wiz Research has identified a new iteration of a broader malicious cryptomining campaign, which we’ve dubbed Soco404.
▶️ Read the article - Soco404: Multiplatform Cryptomining Campaign Uses Fake Error Pages to Hide Payload
Wiz links their recent findings to a broader crypto-scam infrastructure.
Stay cautious, stay safu
Please open Telegram to view this post
VIEW IN TELEGRAM