Sublime
An inspiration engine for ideas
Alternative solutions:1. off-chain identity with on-chain anchoring - bahave like L2 solutions. Only use L1 chain for state change and settlement2. modified sharding - only a subset of network manages/verifies a subset of identities
Kevin Yu • A Technical Commentary on DeSoc: Part I

Impact Networks with David Ehrlichman | Green Pill #59
youtube.com@Bugcrowd 1. Log out.
2. scp and run my https://t.co/iR2U4LdtmJ script.
(Nothing extraordinary.
- Disable root SSH login
- Disable password SSH login
- Load my pubkey, if not already set up.
- Run OS updates.
)
Matias Baldanza.dev 😁 ⚛️x.comManipulated signals in DePIN protocols - a16z crypto
a16zcrypto.coma short security checklist for vibe coders:
- rate limit all api endpoints
- use row level security always (RLS)
- captcha on all auth routes/signup pages
- if using hosting solution like vercel, enable attack challenge on their WAF
add more in... See more
jack friksx.com
Along with @rjdrost, @NamikMuduroglu, we spent the past two months writing this position paper https://t.co/fX0HoeAenh with comments and feedbacks from @VitalikButerin, @sreeramkannan, @post_polar_, @Austin_Federa, and @0xMegaMafia.
Personal computers empower individuals to process an almost-infinite amount of... See more

DeFi is broken.
Last year, we had $3.8b was stolen via exploits, a frequency and severity far too high for mainstream adoption.
We need to fundamentally rethink how DeFi protocols are designed and secured.
Here's one place to start:
🧵... See more
