5 Matching Annotations
  1. Aug 2022
    1. Summarization of Real-world Attacks Exploiting Different Types of Vulnerabilities

      usefull table of vulnerabilities, features, victims, dates and $ amount

  2. Sep 2021
    1. Liquidity pools are pools of tokens that are locked in a smart contract. By offering liquidity, they guarantee trading, and because of this, they are widely used by decentralized exchanges.
    1. Then there are tokens. Tokens by definition do not run on their own blockchain, unlike a coin. They have been added to an already existing blockchain. Tokens can have the same functionality as a coin, although this is not common.Tokens that are created on the Ethereum network are typically ERC-20 tokens.
    2. Developers can program applications that can create, store and manage digital assets, also known as tokens, on the blockchain. For this to work, smart contracts and decentralized applications (DApps) are written and built. The expiration of these contracts and agreements is automatically enforced if the blockchain receives the correct data. You can make complex, irreversible agreements without the need for an intermediary.
  3. Mar 2021