Medium
Bytecode decompilation: features and implementation in the blockchain industry
One of the fundamental concepts of blockchain technology is smart contracts — autonomous programs that provide automation and minimize…
▶️ Read on Medium: Bytecode decompilation: features and implementation in the blockchain industry
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
Socket
Monkey-Patched PyPI Packages Use Transitive Dependencies to ...
Malicious PyPI package semantic-types steals Solana private keys via transitive dependency installs using monkey patching and blockchain exfiltration.
semantic-types package, which is also used to compromise 5 other packages (solana-keypair, solana-publickey, solana‑mev‑agent‑py, solana‑trading‑bot, and soltrade). Malware steals private keys by monkey-patching Solana keygen methods. ▶️ Know more: https://socket.dev/blog/monkey-patched-pypi-packages-steal-solana-private-keys
>25,900 downloads of the malicious packages. Solana devs, check your code 🔍
Please open Telegram to view this post
VIEW IN TELEGRAM
Protect your crypto. Don't trust, verify.
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
IPFS and its progressive role in blockchain, cryptocurrencies, and Web3
You may have heard about ENS on Ethereum or NFT metadata on Solana. These things are united by IPFS — InterPlanetary File System, a Web3…
Find out more about IPFS and its applications in the blockchain industry:
▶️ Read on Medium: IPFS and its progressive role in blockchain, cryptocurrencies, and Web3
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
Selectors guide the EVM to execute the right function of your code. So what are selectors? Let’s dive in.
Selectors are 4-byte identifiers that tell the EVM which function to call, so selectors are critical for contract execution.
🔍 Visibility matters. Selectors are intended for use by external contracts, so only public & external functions have selectors, as they’re callable externally via the ABI. Internal & private functions don’t have selectors as they are not needed.
🔢 How to derive the selector? First, you'll need the function signature. In Solidity, signature is a string that represents the function name plus its parameter types (not names). To calculate the selector, you should hash the function signature with the Keccak-256 algorithm and take the first 4 bytes. That’s it ✨
An example: for
balanceOf(address), the Keccak-256 hash starts with 0x70a08231b98ef4ca…, so the selector is 0x70a08231🛠 Why care? Selectors enable function dispatching, common standards and contract compatibility, and gas-efficient calls. Selectors are also vital for low-level calls.
Understanding selectors is useful for a better understanding of Ethereum smart contract execution and efficient blockchain development 💻
Please open Telegram to view this post
VIEW IN TELEGRAM
Macworld
Complete list of Mac viruses, malware and trojans
Wondering how many viruses exist for the Mac? Here is a list recent Mac malware attacks, viruses for Apple computers, and security threats that Mac users have suffered
This is a classic myth, Mac and iPhone malware thrives, so be vigilant
▶️ An article with the list of Mac viruses, malware and trojans
Always protect your devices and assets
Please open Telegram to view this post
VIEW IN TELEGRAM
Forbes
16 Billion Apple, Facebook, Google And Other Passwords Leaked
As 16 billion credentials are confirmed as having been leaked, is it time to switch from passwords to passkeys?
▶️ Forbes: 16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now
To stay safe online, set strong unique passwords, enable 2FA, monitor suspicious activity
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
What are linters and how can they help in blockchain and crypto development
Code quality is one of the topics that many devs talk about, including (or perhaps especially) in blockchain and crypto development…
And linters are a powerful tool for increasing quality of your smart contract code.
Discover the benefits of using linters to improve coding efficiency, security, and readability 👇
▶️ Read on Medium: What are linters and how can they help in blockchain and crypto development
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
rekt
Rekt - Dodging a Bullet
DeFi / Crypto - No funds lost. No chaos. Just a whitehat report, a five-day fix, and a protocol that treated security like engineering - not damage control. Vesu did everything right… which is exactly why no one’s talking about it.
This is a success story: a crypto project actually prevented losses by implementing coordinated blockchain security measures👇
Read an article: DODGING A BULLET
Proactive security measures are always a best practice
Please open Telegram to view this post
VIEW IN TELEGRAM
Kaspersky
SparkKitty: a new stealer in the App Store and Google Play
The SparkKitty Trojan steals photos from Android and iOS users' galleries.
Trojan steals sensitive data such as seed phrases from user screenshots.
▶️ Read an article: Your cat pics are at risk: the threat posed by the new SparkKitty Trojan
Please open Telegram to view this post
VIEW IN TELEGRAM