LinkedIn Recruitment Phishing Analysis
Author: 23pds & Thinking background In recent years, phishing incidents against blockchain engineers have occurred frequently on the LinkedIn platform. Yesterday, we noticed a post posted by @_swader_ on X.This…
“Long -termists’ in the Crypto industry
Author: dapangdun Long -termists seem to be a very unpleasant word at the moment, because most people in the circle are pursuing “opportunities for getting rich” and “real wealth feedback”.…
A few minutes of Suetong RGB and RGB ++ protocol design: vernacular manual
Author: Faust, Geek Web3 & AMP; Btceden.org Lianchuang With the popularity of RGB ++ and related assets, discussions on the principles of RGB and RGB ++ protocols have gradually become…
Is the $3 trillion market value going to zero again?SHA-256 Collision Attack Makes Breakthrough
Author: OneKey Chinese Source: X, @OneKeyCN Recently, this kind of tweet has become a hot search in the overseas encryption circle:“First practical SHA-256 collision for 31 steps. (The first 31-step…
Slow fog: reverse fishing reveals the routine of fishing with token accuracy
By: Liz, slow fog background Recently, CYBER RESCUE fished the victim under the guise of “can help recover/recover stolen funds” under the guise of “helping recover/recovering stolen funds” under the…
How Near’s chain abstraction leads to a better Web3 experience
Written by: ILLIA POLOSUKHIN; Translated by: Shenchao TechFlow Most Dapps today are not actually real Dapps (decentralized applications).If the user needs to leave the app to start using it, it…
Storage consensus paradigm: The next generation of blockchain does not have to be a blockchain
Source: Wuyue, Geek Web3 A public chain expansion scheme is conceived with the following characteristics: It has a speed comparable to traditional Web2 applications or exchanges, far exceeding any public…