On July 9th, 2025, GMX V1, once a leading decentralized perpetual exchange on Arbitrum, fell victim to a sophisticated reentrancy exploit, resulting in a loss of over $42 million. Although the funds were later returned by the attacker (who kept a $5 ...
Lately, I’ve been diving deep into how Ethereum defends itself — not just with code, but with people, incentives, and solid economics. A lot of people assume attackers can just “hack the chain” to print ETH or drain wallets. That’s not how Ethereum w...
Billions have been lost to forgotten seed phrases. MindGTC offers real recovery — without compromising decentralization.For years, the crypto world has lived by a harsh rule: “Lose your private key, lose everything.” It didn’t matter how much you had...
Introduction Security is a top priority when building decentralized applications on Rootstock, which is a Bitcoin sidechain that enables smart contracts using Ethereum’s EVM. One of the most reliable strategies for defending your smart contracts agai...
Perpetual derivatives have become a cornerstone of decentralized finance. Since the launch of Perpetual Swaps by BitMEX in 2016, these financial instruments have matured significantly, carving out a unique niche in the on-chain ecosystem. According t...
Every day, we entrust our time, data, money and personal information to the digital world. And sometimes it feels like technology promises full protection: encryption, multi-factor authentication, backups… But then why do even the largest companies a...
In the 1930s, France constructed what military engineers considered impregnable: the Maginot Line. A network of concrete fortifications, weapon installations, tank obstacles, and underground bunkers. It spanned the French-German border and represente...
Introduction On November 4th, 2024, 100proof and I sent a vulnerability report to NEAR Protocol's bug bounty program on Hacken Proof. The issue we found allowed an attacker to completely shut down the NEAR blockchain—all the nodes of all the shards—b...
Imagine an app that doesn’t rely on a single company’s servers, isn’t controlled by a central authority, and runs on a network where users hold the reins. Sounds futuristic, right? Welcome to the world of decentralized applications, or dApps—a corner...
Over the past decade, the evolution of Web3 technologies has been both remarkable and tumultuous. While decentralized platforms have ushered in a new era of digital interactions, they have also become prime targets for sophisticated cyberattacks. Th...