"TX"

Search result of

Courses (0)

Articles (133)

Glossary (0)

Making sense of Trust Experience (TX)
Beginner

Making sense of Trust Experience (TX)

This article provides a detailed explanation of the blockchain trust experience.
3/12/2024, 4:10:25 AM
Common phishing methods and security prevention suggestions in Web3
Beginner

Common phishing methods and security prevention suggestions in Web3

Web3 phishing attacks are a common threat to cryptocurrency users. Their purpose is to steal their crypto assets by inducing users to authorize, sign, or misoperate. In this article, SharkTeam systematically analyzes seven common Web3 phishing techniques, including Permit off-chain signature phishing, Permit2 off-chain signature phishing, eth_sign on-chain blind signature phishing, personal_sign/signTypedData on-chain signature phishing, authorization phishing, and address pollution phishing. As well as phishing methods that use CREATE2 to bypass security detection. The article also introduces the black industry chain of Drainer as a Service (DaaS), and provides five security suggestions to help users identify phishing scams and protect the security of their encrypted assets.
5/31/2024, 12:19:11 AM
 In-Depth Analysis of Large-Scale Rug Pull Techniques
Intermediate

In-Depth Analysis of Large-Scale Rug Pull Techniques

The current situation where the security of tokens depends entirely on the project's self-awareness. To address this, we may need to improve token mechanisms or introduce effective token supply monitoring schemes to ensure transparency in token quantity changes. We need to be vigilant, as while people's awareness of fraud is increasing, attackers' anti-fraud techniques are also constantly evolving. This is an ongoing game, and we need to continue learning and thinking to protect our interests.
3/28/2024, 2:26:54 AM
How to Read Block Explorers and Understand Transactions, Traces, and Logs on Ethereum (EVM)
Advanced

How to Read Block Explorers and Understand Transactions, Traces, and Logs on Ethereum (EVM)

Learn read explorers like Etherscan and navigate data across these three key data structures, and how to find the tables you'll need to query.
9/13/2024, 10:21:24 PM
What is orbiter finance?
Beginner

What is orbiter finance?

Orbiter Finance announces its upgrade to a ZK-Tech-based Ethereum acceleration engine, using ZK recursive proof to enhance Layer2 performance while reducing gas consumption.
4/2/2024, 3:18:47 AM
Trustless Interoperability between Rollups: Landscape, Constructions, and Challenges
Advanced

Trustless Interoperability between Rollups: Landscape, Constructions, and Challenges

In this article, we survey the trustless interoperability landscape by defining and discussing six levels of interoperability solutions between fragmented rollup ecosystems.
9/24/2024, 6:42:25 PM
One bad signature will be able to drain your account on Ethereum after EIP-3074
Intermediate

One bad signature will be able to drain your account on Ethereum after EIP-3074

After EIP-3074, a faulty signature could deplete the balance in your Ethereum account. The article elaborates on how wallets integrate EIP-3074 and explains the specific ways it could make users more vulnerable and the underlying mechanisms, aiming to prevent irreversible mistakes.
4/23/2024, 5:47:14 PM
Analysis of the Sonne Finance Attack
Intermediate

Analysis of the Sonne Finance Attack

The essence of this attack lies in the creation of the market (soToken), where the attacker performed the first collateral minting operation with a small amount of the underlying token, resulting in a very small "totalSupply" value for the soToken.
6/13/2024, 12:35:30 AM
The Tale of Monad: Questing for the Arcane Secrets
Advanced

The Tale of Monad: Questing for the Arcane Secrets

Although L2s have successfully scaled Ethereum to some extent, they still face limitations. Monad aims to build a new realm that combines Ethereum's rich culture with the scalability of Solana and Sui, creating an Ethereum-compatible system that meets the efficiency demands of a new era.
1/17/2025, 11:30:02 AM
Censorship, Latency, and Preconfirmations in the Blob Market
Intermediate

Censorship, Latency, and Preconfirmations in the Blob Market

This article explores the potential and impact of the emerging EIP-4844 blob market, akin to the gas pricing mechanism of EIP-1559. The author introduces a solution for preconfirmed blob transactions and invites community participation in the experiment. The blob market could provide a better transaction experience for L2 users, a reliable packaging experience for rollups, and a stable future for the Ethereum roadmap. However, the broadcast and review of blob transactions may be influenced by timing games and censorship. By utilizing blob preconfirmation relays, the blob sidecar broadcasting delay issues on the Holesky testnet can be improved. This research offers a potential solution for the entire community.
3/20/2024, 10:34:13 PM
How to Quickly Check if a Developer (Dev) Has Locked Tokens on the Blockchain?
Intermediate

How to Quickly Check if a Developer (Dev) Has Locked Tokens on the Blockchain?

This article explains how to quickly determine whether a developer (dev) has locked tokens on-chain. By analyzing transaction histories and utilizing tools like Debot, you can track all transfers associated with a developer’s address. Using the $Sora project as a case study, the author shows how to verify token locks through contracts like Streamflow and uncovers discrepancies between the official lock-up information shared on Twitter and the actual status.
1/22/2025, 4:07:03 PM
MEV (6): A Fairer MEV Ecosystem (middle)
Advanced

MEV (6): A Fairer MEV Ecosystem (middle)

This article discuss how to use encryption methods to prevent transaction information from being used by MEV.
1/14/2024, 6:05:10 PM
A brief analysis of Bitcoin Ordinals protocol
Beginner

A brief analysis of Bitcoin Ordinals protocol

This article briefly analyzes the Bitcoin Ordinals protocol with pictures and text.
1/1/2024, 5:39:29 PM
Reasons to have higher L1 gas limits even in an L2-heavy Ethereum
Advanced

Reasons to have higher L1 gas limits even in an L2-heavy Ethereum

The article analyzes the necessity of increasing L1 gas limits, particularly in the value of key use cases such as censorship resistance, cross-L2 asset transfers, and large-scale exit mechanisms. Through concrete examples and mathematical calculations, the article demonstrates that even in an L2-dominated world, a 10x scalability of L1 still holds significant value. This analysis not only supports the short-term necessity of L1 scalability but also provides valuable references for Ethereum's long-term technical roadmap.
2/26/2025, 6:45:17 AM
 Understanding the PRC-20 Protocol and Popular Polygon Inscription Tokens
Beginner

Understanding the PRC-20 Protocol and Popular Polygon Inscription Tokens

Inspired by BRC-20, the PRC-20 protocol emerges. This article mainly introduces PRC-20 token POLS on the Polygon network.
2/8/2024, 8:09:08 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective