Jim McDonald
Jul 27, 2017 · 1 min read

If you do that you leave the contract open to abuse by malicious receivers.

In general you need to consider the case that any individual participant could be malicious as well as (and this is the nasty one) the case where all participants are malicious and conspiring jointly against the contract. The contract should be safe from all of these attack vectors to be truly secure.

    Jim McDonald

    Written by

    Focusing on real-world use cases for Ethereum