Today we saw how ThorChain protocol get rekt on multiple levels. First we saw a black-hat attack the protocol and steal $8M. > THORChain has suffered a sophisticated attack on the ETH Router, around $8m. The hacker deliberately limited their impact, seemingly a whitehat. ETH will be halted until it can
Yesterday we talked about Proof of Stake and Beacon Chain [https://www.adrianhetman.com/unboxing-ethereums-proof-of-stake/]. But to truly appreciate Beacon Chain, we need to talk about sharding. The main difficulty in achieving scalability that Blockchains (including Ethereum) currently face is that every node has to verify and execute every transaction.
In today’s post we’re going to unbox another popular type of attack, front-running transactions. This type of attack takes different forms and can be used in various ways. One of the examples of front-running I explained recently during ERC20 approval unboxing [https://www.adrianhetman.com/unboxing-erc20-approve-issues/]. But first
Ethereum smart contracts use a rather abnormal storage model inside EVM. It is not necessarily useful to know and understand how data types are represented at a low level in a typical programming language. Solidity and other EVM-type languages are different as this knowledge is crucial as storage access is