Ethereum Loopring Pay is Live: zkRollup Transfers on Ethereum |
- Loopring Pay is Live: zkRollup Transfers on Ethereum
- Smart Contract Security Newsletter #39
- Would love your feedback on a crypto investment simulator I made. (So you can test your investment strategy risk free)
- Let’s kill this ponzi.
- WATCH: Learn JSON-RPC Via awesome Dev Tools
- Taylor Interpreter v.0.0.1 Live! (Lisp-like language, interpreted by EVM & ewasm)
- High fees - what's the solution?
- Question about possible attack vector related to staking.
Loopring Pay is Live: zkRollup Transfers on Ethereum Posted: 06 Jun 2020 01:00 AM PDT
| ||
Smart Contract Security Newsletter #39 Posted: 06 Jun 2020 03:08 PM PDT
| ||
Posted: 06 Jun 2020 05:27 AM PDT
| ||
Posted: 06 Jun 2020 12:57 PM PDT
| ||
WATCH: Learn JSON-RPC Via awesome Dev Tools Posted: 06 Jun 2020 08:33 AM PDT
| ||
Taylor Interpreter v.0.0.1 Live! (Lisp-like language, interpreted by EVM & ewasm) Posted: 06 Jun 2020 05:54 AM PDT Try out your skills at https://loredanacirstea.github.io/taylor on all major testnets. Autocomplete will save you, but if you are stuck, watch: (phone & tablet friendly) [link] [comments] | ||
High fees - what's the solution? Posted: 06 Jun 2020 06:27 AM PDT It is going to be a couple of years before ETH 2 is available. In the meantime what are the simplest, most pragmatic, near-term solutions to the problem of high fees across the network? [link] [comments] | ||
Question about possible attack vector related to staking. Posted: 06 Jun 2020 07:32 AM PDT Is it possible for an attacker to make a deposit to the staking address ahead of the real validator and therefore associate their own ETH address for the withdrawl? This is under the assumption that the attacker is able to monitor a compromised machine and intercept the creation of a validator and retrieve the keys and the deposit data. He would then immediately send 32 ETH to the validator address, getting ahead of the victim and causing the victim's deposit to be included in a latter block. In other words, compromising the validator keys and deposit data before the real user gets a chance to complete the deposit would result in associating the attacker's withdraw address and cause the victim to loose the entire deposit. Also, what happens if both deposit transactions are included in the same block - would they be rejected or would one of them be picked over the other? [link] [comments] |
You are subscribed to email updates from Ethereum. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment