Security

The Web3 world is filled with both opportunities and risks. This topic will provide you with a comprehensive analysis of security incidents in Web3, uncover common attack methods and vulnerabilities, and offer practical asset protection strategies and guidance.

Articles (140)

 A New Perspective on Public Chains by Movement: Can Introducing Move into EVM Redefine Ethereum and Move?
Intermediate

A New Perspective on Public Chains by Movement: Can Introducing Move into EVM Redefine Ethereum and Move?

Unlike Aptos, Sui, and Linera, which are all L1 public chains based on the Move language, the new generation Movement is focusing on L2. It has launched the first Ethereum L2 based on the Move language, aiming to leverage the underlying execution performance and security advantages of Move and further integrate the ecological advantages of EVM. This allows developers to launch Solidity projects on M2 without writing Move code.
7/10/2024, 6:39:46 PM
Comprehensive Guide to Fully Homomorphic Encryption (FHE)
Beginner

Comprehensive Guide to Fully Homomorphic Encryption (FHE)

Fully Homomorphic Encryption (FHE) represents the cutting edge of privacy protection technology. It offers exceptional privacy safeguards and can be utilized in Web3 for securing transaction privacy, protecting AI data, and enhancing privacy in co-processing units.
7/10/2024, 2:05:01 AM
Analysis of the Sonne Finance Attack
Intermediate

Analysis of the Sonne Finance Attack

The essence of this attack lies in the creation of the market (soToken), where the attacker performed the first collateral minting operation with a small amount of the underlying token, resulting in a very small "totalSupply" value for the soToken.
6/13/2024, 12:35:30 AM
False Chrome Extension Stealing Analysis
Advanced

False Chrome Extension Stealing Analysis

Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.
6/12/2024, 3:30:24 PM
Identifying and Preventing Address Poisoning Attacks
Intermediate

Identifying and Preventing Address Poisoning Attacks

In this in-depth research, we will examine recent high-profile events, get to the bottom of this sneaky attack, and provide you with the knowledge you need to protect your digital assets.
6/11/2024, 4:05:03 PM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective