Pinnedʇndɾɐꓤ uᴉqoꓤRoll Back Tokens — No more hacks?An extended ERC-20 tokens to revert/undo the transfer made from a compromised EOA or a malicious smart contract using zkProofs.Jul 23, 2023Jul 23, 2023
ʇndɾɐꓤ uᴉqoꓤThe Math Behind — Elliptic Curveelliptic curve cryptography (ecc) is a public key cryptography method based on the algebraic structure of elliptic curves over finite…Sep 21Sep 21
ʇndɾɐꓤ uᴉqoꓤThe Math Behind — SHA256sha-256 is a complex cryptographic hash function that relies on several mathematical principles to ensure security and efficiency…Sep 11Sep 11
ʇndɾɐꓤ uᴉqoꓤI am ZK-Basedit’s like saying, “trust me, i know what i’m talking about,” and everyone just goes along with it, no questions asked.Aug 20Aug 20
ʇndɾɐꓤ uᴉqoꓤAdvanced Solidity Keywords — Make Smart Contracts More EfficientFollowing are the list of keywords and examples of implementation of advanced keywords, that can help make smart contracts more secure and…Oct 20, 2023Oct 20, 2023
ʇndɾɐꓤ uᴉqoꓤThe AI in the BlockchAIn — How AI will see the world?AI will help validate the blocks, no sybil attacks, time-jacking… we have heard them all. Let’s talk about what blockchain can do for AIOct 11, 2023Oct 11, 2023
ʇndɾɐꓤ uᴉqoꓤInitial Coin Auction (ICA) — New way for fundraisers!ICA enables users to vote their price for the coin/token using user-centric approach.Aug 27, 2023Aug 27, 2023
ʇndɾɐꓤ uᴉqoꓤCreate Upgrade-able (Proxy) contracts from Smart Contracts — Diamond Patterna new way of deploying proxy contracts that requires multi-source data storage!Aug 20, 2023Aug 20, 2023