Librehash Research


Channel's geo and language: World, English


Blockchain Research.
We don't have our own 'token' or anything to sell you.
Enjoy the information.
-Librehash

Related channels

Channel's geo and language
World, English
Statistics
Posts filter


Forward from: Libre Blockchain
Extracting relevant quotes from the paper (this is fucking BAD):

1. "In particular, we deconstruct Monero's P2P protocol* based on its source code, and develop a toolset to explore Monero's network, which allows us to infer its topology, size, node distribution, and node connectivity."

2. "We show that* Monero's network is highly centralized - 13.2% of the nodes collectively maintain 82.86% of the network connections."

3. "We have identified approximately 2,758 active nodes per day, which is 68.7% higher than the number reported by the MoneroHash mining pool."

4. "We also identified all concurrent outgoing connections maintained by Monero nodes with very high probability (on average 97.98% for nodes with less than 250 outgoing connections, and 93.79% for nodes with more connections)."

Researchers reported they were able to extract 21,678 IP addresses belonging to 970 different ASs (Autonomous Systems).

5. "Out of these collected IP addresses, our nodes established connections with 3,626 peers, and identified 703 peers to which no connection could be established, but that were active and connected to reached nodes." ("we say that peers are active and reachable if our nodes can establish connections with them")

6. "Our approach shows that only about 20% (i.e., 4,329) of the discovered nodes were active, and the remaining nodes were offline during the data collection period [approx. ~one week]. This indicates that the exchanged IP addresses are inactive in Monero's network, and might decrease the network connectivity."

7. "Later on, we contacted the Monero team for clarification, and they confirmed that 5 seed nodes were not available. By comparing the discovered heavy nodes with public Monero mining pools and seed nodes, we found that 9 heavy nodes are maintained by mining pools, and that 2 heavy nodes are Monero seed nodes."

8. "It is obvious that an user's IP address is exposed along with its connections. This leaves a chance for the adversary to identify different roles (miner or client) in the network depending on their connectivity."

9. "A small fraction of the nodes have more than 1000 outgoing neighbors, while a large fraction of nodes have less than 100 outgoing neighbors."

10. "An attacker can potentially launch different types of attacks. For example, an attacker could launch a targeted attack by monopolozing all connections of a victim node, selectively partition the network, or even de-anonymize transactions by identifying the first node relaying a transaction."

11. "Our experiments show that even though Monero is a privacy-preserving cryptocurrency, it is still possible to accurately discover the nodes in the network and their interconnections. Our analysis provides insights about Monero's degree of centralization, and about the privacy and security issues potentially caused by the network topology exposure."


Forward from: Libre Blockchain
All IP Addresses Connected to Monero's Network are Discoverable (really; yes, the Monero core team knows about this too)

Woops, forgot to mention this too. This combined with the fact that TX sets can have their anonymity reduced by 50% is what damn near kills Monero (and makes it so that an individual using this protocol can literally be identified down to the fucking computer they sit at).

Of course, I have links to that (peer-reviewed) research:

1. https://sci-hub.se/10.1007/978-3-030-51280-4 (free link; don't snitch on me)

2. Springer Article link (paywall; peer-reviewed) = https://link.springer.com/chapter/10.1007%2F978-3-030-51280-4_31

edit (READ!)

The relevant study is on page 578-592 (published at the 'Financial Cryptography & Data Security' conference, held annually).

Study titled, 'Exploring the Monero Network'. Publication date (year) = 2020


Old news but here’s a new take. Nobody discussed how taking back funds from the Wormhole hacker required exploiting what ‘Oasis App’ effectively described as a “zero day” in Gnosis Safe MultiSig smart contracts.

That’s concerning to say the very least. Especially when considering the fact Oasis alleged the bug was one already known by other parties & had been exploited in the wild at least once beforehand.






Dayummmmmmmm


Forward from: unfolded.
Multicoin Capital’s hedge fund lost 91.4% in 2022 — link


Kelly Criterion Applies Exquisitely to Mining

When the mathematical proof & paper behind the Kelly Criterion (optimal bet) was published (90's), there existed no real-world scenario where this mathematical principle could be applied with expected effectiveness.

It Does Not Apply Well to Trading & Markets

Why? Simple answer = asset prices are not dictated by probability. Perhaps you could model an estimate, but that would only be based on prior data.

The Kelly Criterion shines in instances where the payout/profit AND the % of obtaining said payout are BOTH KNOWN.

PoW Mining Fits Like Cinderella's Glass Slipper

1. The literal mechanism used by miners to obtain the 'winning' nonce value relies on hashing data using an algorithm that's designed to map inputs to a set of outputs stretched across a universe spanning from 0 to ∞.

2. Bitcoin provides a target for the hash output that calculates how long it should take the network (aggregate) to find an eligible nonce for a given block height. Every 2016 blocks, the difficulty is re-adjusted based on prior performance to meet this target.

3. Based on #1 and #2, we can mathematically derive the % that the nonce is found.

3a. The 10-minute target instantiates a Poisson distribution (% of successful trial shifts based on time elapsed since start).

3b. The nature of SHA256 as a hash algo makes each hash (guess) a bernoulli trial (binomial outcome; either you found a winning nonce [success] or you didn't [fail])

4. Since probabilities are based on the entire network's aggregate expended efforts, mining pools can estimate their deployed hashrate % relative to the rest of the network with the same level of reliability (no guess on upper bound limit for time elapsed before estimates become stale [# of blocks confirmed since last calculation].

5. Every block pays out a fixed reward of 6.25 $BTC (we will leave fees out of this entire construction since those are nominal compared to coin base payout ... for now).

6. A large mining op requires some contract w an electricity provider (generally priced down to the $$/wattage for some fixed period of time). The estimated # of hashes/second per machine should be known too (exclude overclocking, software mods etc. for simplicity's sake). Storage/warehouse overhead should be constant (lease/rent) & known.

^^ With all of our costs known, our probability of success known and the value of our reward also known - the Kelly's Criterion fits perfectly.

I'm not in the back office at a large mining firm. So I'm more than confident they've likely long since come to the same conclusion as myself. Notably, there exists nothing online alluding to such a calculation. That's not surprising though as its unlikely that all participants have made this deduction in optimal output (example: Marathon Mining + Riot Blockchain + Core Scientific made absurd purchase orders w massive delayed delivery times at the height of the bull market + deriving profit estimations in $$ for investors they debt financed from that unrealistically projected $BTC value >1 year later & resource consumption costs even before relevant contractual agreements had been established).

They're either dumbasses or dumb asses. Hard to figure which. Either way, Bitmain & Foundry (DCG) ended up laughing to the bank.


Main Point of Observing the 'Kelly Criterion'

Point out that mining pools never deploy their full hashrate capacity.

Bitcoin's current estimated network hashrate = 325 Eh/s. Two days ago, the network notched a new record at 350+ Eh/s.

Those totals are likely far below what the network hashrate would be if all major mining pools (share >1%) deployed their maximum hashrate. Kelly Criterion is a 'proof' for why this holds true (assuming mining pools are rational, financially motivated actors operating with selfish intent).

Example Proving Kelly

1. Suppose someone gave you $25

2. That money is to be used for gambling on the outcome of a coin flip (heads / tails). This special coin lands on heads 60% of the time, not the normal 50. This is a fact that's known to you beforehand.

3. Each bet is "even-money". So that means whatever you put up is what you get back (i.e., bet $5 and win, then you get your $5 back + another $5, leaving you with $30 total).

4. You have to bet at least $1 each round and there are 300 rounds max (assuming you don't go bankrupt beforehand).

Based on the above, most of you reading have likely already concluded that there exists some "optimal" total you should bet each round, contingent on however much you have to start the round.

The formula used to derive that 'optimal bet' is the "Kelly Criterion".

According to that Wikipedia article I linked above, "The right approach would be to bet 20% of one's bankroll on each toss of the coin, which works out to a 2.034% average gain each round." (that % is based on the geometric mean ROI per round after 300 trials have been completed)

^^ The % of the total available capital you should deploy to optimize returns remains the same. However, the literal dollar amount obviously fluctuates contingents on wins or losses.

Assuming your payouts were always honored (i.e., dealer/house has unlimited money to pay out earnings regardless of bet size), then the "theoretical expected wealth after 300 rounds works out to $10,505".

Note that the 'Kelly Criterion' is backed by a mathematical proof.


Kelly Criterion: Likely How Mining Pools Determine How Much Hashrate to Deploy

This article explains the Kelly criterion: https://en.wikipedia.org/wiki/Kelly_criterion

In a nutshell, its a probabilistic theory for determining the optimal "theoretical size for a bet" when expected returns are known.

This model is very likely employed by mining entities (at least at a macro level; perhaps micro as well, but haven't explored that yet). This is based on observations I've made re: hash rate fluctuations & hash rate % changes of various firms while controlling for (a) changes in price (b) changes in hash rate by competing mining pools (c) changes in demand for hash rate [i.e., via mining equip. sales] and (d) changes in the # of pending transactions/average fee rate per transaction.

Known Expected Return

We know what the reward is for winning a BTC block (6.25 $BTC). Based on one's hash rate % out of the network's total, mining entities can derive a very realistic & reliable expectation for how much $BTC they will obtain in a given day (i.e., 144 blocks/day x 6.25 BTC/block = 900 $BTC; mining pool w 20% hashrate can estimate bringing in 180 BTC that day). [ignoring $BTC earned from added fees to transactions, which are non-trivial but nowhere near as influential on decisions miners make relative to block reward].


Submitted 2nd Avalanche Zero Today on HackenProof

This one details a critical flaw in an implementation they have that could allow for the trivial theft of private keys. Other protocols account for this but they don't (notably ETH & BTC do, which they claim to derive from).

Let's see if this project has the integrity to pay out this bug bounty.

I'll give them 7 days flat.


Never Use Linen Wallet

You've probably never heard of them anyway (which is a good thing), but these folks ended up "scamming" me for more than a couple thousand dollars after someone contracted my services on their behalf to provide some technical documentation for them.

You can see their site here - https://linen.app/

Why You Should Never Use These Guys

Is it because they flaked on paying me what I was owed for my hard work & labor? No. There are plenty of reasons outside of that, so let's dig into some of them, shall we?

1. Not Open Source - I don't care how amazing, innovative, creative / otherwise that someone claims their app or idea is. If it has anything to do with managing or storing your funds and the it the code is not open source, then there's absolutely no fucking reason for you to trust it. By default. Its a black box out the gate. Trusting closed source software to secure & manage your funds is the equivalent of you basically trusting a stranger with your wallet, credit cards & bank account info using nothing more than the 'honor system' as reassurance you won't get bled dry.

2. Grandiose, Overstated Claims on Their Site - They state on their main page that they are "the most simple and secure self-custody wallet". No matter how much I vehemently disagree, that statement can't be considered a lie on its face because its subjective. However, they follow up and state, "we can't use your crypto nor can suspend withdrawals"; that latter part is not true. If you're curious, I'll be publishing a write-up in short order explaining why its not.

2a. Should go without saying that the last declaration in their byline stating, "you are in full control - always" is also bullshit.

Are They a Scam?

No, they're just a bunch of dopes that are riding on the coattails of the Gnosis Safe MultiSig contract orchestration (which is free, audited and open source). You can find that here - https://gnosis-safe.io/

All these guys did was just throw a GUI on top of it, package it up as an iPhone app then push it to the App Store alongside a not-that-impressively designed landing page to serve as the face of a site with barely any information on it and no documentation.

Linen Wallet is a quintessential example of what you don't want to sink your money in when it comes to blockchain.

Closed source is always a no-go when it comes to wallet apps or anything security-related. I don't give a fuck what it is or what lofty, grandiose reasons are given for trapping the code behind a black box. If they really gave a fuck about your security (and knew what they were doing), then they'd have no problem making the backend code for their platform open source.

Could go on in much more detail about all the things wrong with a product offering like this - but I'll cap it there.

In essence, fuck Linen Wallet. They get a fat thumbs down. 0/5 stars. Maybe 1 for effort or because that's the least that we're allowed to give these clowns on the App Store if we felt like wasting the time required to find this app & actually download it.


Purchase eSIMs with Monero

Okay, so we just took a look at a shitty Monero service that you probably shouldn't trust.

Let's take a look at one that you may find intriguing if you are a Monero fan.

The website is silent.link

According to the site, they offer, "Get global mobile 4G/5G Internet access and burner phone numbers instantly and privately on any modern eSIM-compatible smartphone."


Trocador - Anonymous Monero Swap Service

Just found out about this one. You check it out here - https://trocador.app/en/

This is NOT a Recommendation

Looked through the service briefly...looks cool. Everything they write on there sounds nice.

There's just one thing...

There's no link to any code published anywhere. There's no audit from any reputable firm - in fact, there's not even so much as a vouch from a buddy that affirms the safety / soundness of this service.

There are no details on how this service works on the backend either. No documentation, no nothing. So - thumbs down.

Why Thumbs Down?

You're only using a service like that if you want to make absolute sure that nobody is tracing your transactions. No need to bullshit or talk around it. Who knows what those reasons are for - I personally don't give a fuck.

BUT if you're so paranoid, you feel a service like this is an absolute necessity then...you're going to want something with some level of assurance that its actually providing you the privacy you think you're getting. Otherwise, you're better off just moving your funds through Coinbase and relying on a promise from Brian Armstrong that he isn't going to tell anyone you did it! (see how stupid that sounds? its even dumber to trust some random person(s) on the internet with your money and the responsibility of keeping your transactions secret just because they said so).


OpenLaw Was Innovative

Apparently it was an ecosystem designed to facilitate the deployment of "real world contracts for Ethereum", which was a novel idea at the time of its inception (even if funded by Consensys, as most things are in this space).

Here's their site: https://openlaw.io

Idea Has No Value on ETH Now

Since their move to 'Proof of Stake', Ethereum is technically no longer a blockchain. That's an idea that few (or hardly any) will espouse for fear of facing the wrath of all the "powers that be" in this space, but what was just stated is an accurate statement about blockchain.

Blockchain is premised on a chain of hash functions through the inclusion of the prior block within the data of the subsequent one (in perpetuity) with the goal of ensuring that any amendments made to a prior transaction that had already been mined would require re-computing all subsequent blocks.

However, there is nothing to "recompute" anymore. Therefore, the purpose of the hash chain construction is nonexistent within this context because the "work" portion of blockchain can no longer be proven (as the resource requirement was denominated in energy, not assets, there's a difference).

If You Disagree

That's fine - I expect it. But note that my explanation thoroughly explains the reason for my disposition.


Forward from: Libre Blockchain
If this isn't correct or you don't buy the theory then ask Wintermute why they haven't revoked permissions for the following vanity EOAs that they own:

1. 0x00000075877451C59D5777bE4b7B353f4E9CB002
2. 0x0000008Daa54dfe43CF4b8335D03B331F14C7Ce8
3. 0x0000006a522D90555B17495BAE08F816d238D070
4. 0x0000005b4C6b3D00a76b1b5391d5088f9A0C6C5d
5. 0x0000004d22de42ddc13F62f3369808F020AC2e0f
6. 0x0000003FA95692678Cf20875c5b8F7C3D0Bde749
7. 0x000000C1e971F14B6BBe9ba0e75f733DC56C7f1e
8. 0x0000006E413F09535F3C4Cf8B97740dA92A0567B
9. 0x0000000443B58815033b478B9edAf9657BCa19f2
10. 0x0000005025298557E87B2E3baFca55A8494B470A
11. 0x0000004cA46C84402010e9a8405036b187A25301
12. 0x0000008Ed0138F01eA136c1745c87cbde33DaEaF
13. 0x00000040BEb3e8C85F2a8bE784644007DF91B152
14. 0x0000005e976f90F28632232999B39dB9Ad13c9e8
15. 0x0000005c3cD964E7Dc604C1255a02fAEf121Cab8
16. 0x000000fcEbBfCF3b9398afA6AA4b191C68ea30DC
17. 0x00000024980938A0ed61b5b7187035711CC7ed02
18. 0x000000B53dF9737C19e6BDF98D38b679a46fD8b3
19. 0x000000c269023E9736421C5d0Fa9c0835074cE7d
20. 0x000000e900bEED1eC9aa919346a285BE148b7108
21. 0x000000975950cdba05763C59755992A016fABC20
22. 0x00000038F3BD87bBc42A07DfC88b98CbA3313c49
23. 0x000000A2889909f69ff8A05025AD58f3fBdf9739
24. 0x00000035d6BCbd9970bd7adaF0776dA93107992b
25. 0x000000E1119285aE7208a55Fceef7Eb1B694389d
26. 0x00000015D46D8DF6d1F170252a174d7102f2EC04
27. 0x0000002b731aa64e4B395c4f62521b97Da993fC0
28. 0x000000d8F18DE7Fb357044D4C5C8758D89f120E5
29. 0x0000006Da87A99a58E9652937e987df1F74FE148
30. 0x000000bD1626cC4A596417c57EDFcCa18F1e7477
31. 0x000000f36A704287A258ca72A4f75f9E257e51D4
32. 0x000000FBcc06c79e232aC023556d374e6199e1F0
33. 0x0000004E386f2ac6ff522860D957Bd637879ad43
34. 0x000000c47913af2a4cd6523BB32F45D1023d5DAE
35. 0x00000042D2d0aa64E0505A13eAcdc9984a024322
36. 0x0000007eeE50167CCef12745e19967667ff16E55
37. 0x000000b11f0013D97124fD89d21940E46aaB852d
38. 0x00006196242a1D328fe4B636995e796cb6c7a2Ac
39. 0x0000495194Ec698FCF89ccF8aBB445dAf01Db497
40. 0x00007d83668899A2aF7b5b03efd2351585843dE9
41. 0x0000A0756737268a633cd9296F1B154cf74430b6
42. 0x000000A23C3512d4AAB1129564b7E4e1Ff571287
43. 0x000000C3cfD83E7F9D856bED82231e8a00a1b07F
44. 0x000089D643EDa1f3E45a945017E5eb1D09F9b2b2
45. 0x00000092efe40470C25228372310142836f1eDa6
46. 0x00000075877451C59D5777bE4b7B353f4E9CB002
47. 0x0000008Daa54dfe43CF4b8335D03B331F14C7Ce8

Point of This Exercise

Wasn't a fan of the bogus coverage by CoinTelegraph (no problems with BlockSec), due to their eagerness to discount what I had published, since it was credible enough to warrant a legitimate response and in-depth look into what was actually going on behind the scenes with Wintermute.

To this day, questions remain (and they should). Their affiliation with FTX is in question as well. For those that don't know, Wintermute was the second leading market maker on FTX behind Alameda up until the day of FTX's collapse.

Somehow, they were able to extract their funds from the exchange right before their collapse and shuffle them all over to Binance...right in the nick of time. How convenient.

Not even Genesis was that fortunate. Or BlockFi. Or anyone else, really. What are the chances? What intuition did they have that virtually everyone else on planet earth lacked?


Forward from: Libre Blockchain
Proving (Again) That the Wintermute Hack Was an Inside Job

Let's start with this address: 0x0000004160e1cd84570904ce06a8fe87107ffa2c

Notice anything familiar? Of course you do.

1. It starts with a bunch of leading zeroes (just like the other one we identified that was allegedly compromised).

1a. That means that this address is a vanity address.

2. This address also has admin privileges granted to it by the Wintermute smart contract that was compromised.

3. This address was created on September 15th, 2022 and was active until September 30th, 2022.

4. It interacted with the Wintermute Smart Contract before, during and after the hack (so there were transactions from this address spliced in between the 'hacker' transactions that were initiated by the supposedly compromised 0x00...fe6a514 EOA address)

Common sense tells us that based on the set of facts listed above that this address should also be considered compromised.

- It is also a vanity address, like the 0x00...fe6a514 address. If they generated the 0x00...fe6a514 vanity using the faulty vanity address generator tool, there's no reason to assume they would've changed course for the 0x00..4160e1 address (identified in this post)

- The 0x00..4160e1 address clearly had / has permissions to move funds from the Wintermute Smart Contract. This is evidenced in multiple transactions. Like, this one, for example

- Note that transaction that was linked in the previous bullet point. That one was executed on September 22nd, 2022. That was two days after the hack. This TX was a call made by the 0x00..4160e1 address on the Wintermute smart contract that removes $13k+ worth of funds from that contract to another address


Forward from: Libre Blockchain
BlockSec's Confusing and (Now Proven) Wrong Response + CoinTelegraph Unprofessional Nut Riding

Apparently me publishing that report sent* certain entities into a frenzy in this space (wonder why) because they spent an unreal level of effort trying to "debunk" the claims that I made.

CoinTelegraph was so eager to label me a "crypto sleuth" and proclaim my theory "debunked" that they barely had time to reach out to get my comment / feedback before publishing (since they didn't; rookie mistake number one because I know what the fuck I'm talking about and I walked BlockSec into this).

Here's the CoinTelegraph article in question I'm referring to: https://cointelegraph.com/news/wintermute-inside-job-theory-not-convincing-enough-blocksec

From the article: "Earlier this week, cyber sleuth James Edwards published a report alleging that the Wintermute smart contract exploit was likely conducted by someone with inside knowledge of the firm, questioning activity relating to the compromised smart contract and two stablecoin transactions in particular."

Here is the Medium report published by BlockSec where they allegedly 'debunk' what I published (which perhaps they did - but they didn't put to bed the theory that the Wintermute hack was an inside job and you'll see why in the following message) - https://blocksecteam.medium.com/our-short-analysis-of-the-accusation-of-the-wintermute-project-dbde1ed11ef8

Summarizing Their Rebuttal (what dog do they have in this fight? side note)

1. They apparently were able to identify the two transactions in question where the Wintermute team granted admin access to the compromised EOA address and revoked it (respectively). You can find those TX IDs clearly published in their Medium report above.

2. They conclude that my analysis was incorrect since I did a check on whether the compromised address in question was designated an admin by the smart contract. My check showed that it wasn't. Their rebuttal to this is that it shouldn't have since it had already had its admin privileges revoked at the time of me checking - but that this overlooked the fact that at the time of the attack's execution, the vulnerable generated address was indeed an admin.

Next message you'll get my response to BlockSec's response that blows everything that they wrote clean out of the water and puts the Wintermute project back in fucking question.


Forward from: Libre Blockchain
Wintermute Hack Was Actually an Inside Job

There's new, relevant information seriously questioning the narrative that this channel's Wintermute Inside Job theory was "debunked" (it wasn't - at all - because BlockSec and Wintermute failed to account for one critical detail in their failed attempt to debunk Librehash).

Hopefully CoinTelegraph has enough journalistic integrity to either update the embarrassingly off-base article that they published claiming my claims were debunked or publish a new one in their series covering the event that makes it abundantly clear that nothing was debunked because this channel doesn't publish conspiracy theories or push half-assed, poorly researched ideas for the sake of generating clicks, views or otherwise.

To understand what I'm talking about, how this started, and what's been published (on both of sides), I'm going to briefly walkthrough the order of events that have led us to this point.


What 'Wintermute Hack'?

A lot has happened since this event, so if you forgot about it or it slipped your memory - that's understandable.

Way back in September, Wintermute was hacked to the tune of approximately $160M or so.

The narrative that was pushed by the Evgeny (Wintermute founder/lead) and the surrounding community was that the hack was made possible because:

1. The team generated an EOA (regular address on Ethereum) using a "vanity address generator tool" they grabbed from GitHub. FYI a 'vanity address' is one that's specially created to have a human readable phrase/word located within it somewhere or designed to begin with a certain # of leading zeroes (which was the case in this instance). The specific address in question was: 0x0000000fE6A514a32aBDCDfcc076C85243De899b (edit: sorry put up the wintermute smart contract itself at first, substituted it with the correct address now - apologies!)

2. Just a week prior to the Wintermute hack, 1inch (DEX) published an analysis that found that this specific tool used to generate these vanity addresses did so in a cryptographically insecure method that allowed for the practical recovery of the private key associated with any address generated with this tool.

3. Putting #1 and #2 together, you've probably figured that this vanity address identified in #1 was supposedly compromised (via some hacker that somehow deduced that said address was generated using this tool or took a lucky gamble & set about attempting to recover the private key associated with that address).

3a. After said attacker was able to successfully recover the private key to that address (allegedly), they were then able to drain the Wintermute smart contract of all of its funds because this insecure vanity address we identified in #1 was apparently designated an 'admin' by Wintermute's smart contract, which granted it to the authority to unilaterally manage and move funds held by the Wintermute smart contract. Thus, by compromising that address, the attacker effectively was able to compromise the Wintermute Smart Contract.

All sounds good, right?

Not really because this theory didn't pass the sniff test. This channel published an analysis questioning the legitimacy of these claims by Wintermute back on September 26th both on Medium and Twitter which gained a surprising amount of attention all things considered.

You can read the original Medium report here - https://medium.com/@librehashresearch/analysis-of-the-wintermute-hack-an-inside-job-736422c08ef1 (won't bother linking the Twitter thread since that's redundant).


Forward from: Libre Blockchain
The tools used to identify, dissect, analyze and parse the contracts are all freely available online and the write-up pushed into this channel that analyzes the compromise of this project runs through how one would access said resources and leverage them for these purposes.

If there are any questions or suggestions, feel free to add those to @librehashdiscussion - your feedback is more than valued :)

20 last posts shown.

402

subscribers
Channel statistics