Open in app

Sign in

Write

Sign in

Nufail.Eth
Nufail.Eth

88 Followers

Home

Lists

About

Aug 7

What is Zero Knowledge Proof and zkEVM

What is Zero Knowledge Proof (ZKP)? Zero Knowledge Proof (ZKP) is a cryptographic principle that enables one party, known as the prover, to demonstrate the truth of a statement to another party, called the verifier, without exposing any specific details about the statement except its validity. …

Polygon Zkevm

3 min read

What is Zero Knowledge Proof and zkEVM
What is Zero Knowledge Proof and zkEVM
Polygon Zkevm

3 min read


Published in

Block Magnates

·Feb 27

Hyperledger Fabric — Create a Permissioned Blockchain using Fabric — Chapter 2

In the previous chapter, we launched a test network using fabric samples and created a channel to interact with the peers and chaincode. Chaincode is where you apply your business logic to the blockchain. In this chapter we will be: Creating chaincode Packaging the chaincode Installing the chaincode on peers …

Private Blockchain

4 min read

Hyperledger Fabric — Create a Permissioned Blockchain using Fabric — Chapter 2
Hyperledger Fabric — Create a Permissioned Blockchain using Fabric — Chapter 2
Private Blockchain

4 min read


Published in

Block Magnates

·Feb 6

Hyperledger Fabric — Create a Permissioned Blockchain using Fabric — Chapter 1

What is Hyperledger Fabric? Hyperledger Fabric is an open-source private distributed ledger technology created by the Linux Foundation. Fabric supports smart contracts, aka chaincodes written in Go, Java and Node.js. If you are new to the fabric I suggest you read the Fabric's official documentation to get an understanding of Peers, Certificates, Channels, etc. …

Hyperledger Fabric

3 min read

Hyperledger Fabric — Create a Permissioned Blockchain using Fabric — Chapter 1
Hyperledger Fabric — Create a Permissioned Blockchain using Fabric — Chapter 1
Hyperledger Fabric

3 min read


Published in

Coinmonks

·Dec 23, 2022

Hold and Transfer ERC-20 on a Smart Contract

Solidity smart contracts can also hold ERC-20 tokens like it holds native coins such as ETH/MATIC/BNB. Holding ERC-20 in a contract is for multiple purposes. It can be for Staking, Locking and Releasing tokens, Banking and etc. New to trading? Try crypto trading bots or copy trading on best crypto…

Erc20

2 min read

Hold and Transfer ERC-20 on a Smart Contract
Hold and Transfer ERC-20 on a Smart Contract
Erc20

2 min read


Nov 21, 2022

What is SBT and How to create an SBT?

Tokenization is one of the key features of Blockchain. You can tokenize any physical or digital items and convert them into single or multiple tokens. Doing this keeps your asset secured and easy to use. What is SBT? In tokenization, tokens can be transferrable through the owner's consent. Documents like Birth Certificates and…

Soulbound Tokens

2 min read

What is SBT and How to create an SBT?
What is SBT and How to create an SBT?
Soulbound Tokens

2 min read


Sep 27, 2022

Create NFT with Royalty (EIP-2981)

What is NFT? NFT aka Non-fungible tokens are a trend amongst Blockchains. The EVM standard for NFTs can be ERC-721 and ERC-1155 (Multi-token Standard). NFTs can be sold on marketplaces such as Opensea, Rarible, LooksRare. What is Royalty? Royalties are a percentage (commission) for the creator/artist of the NFT for every secondary sale done on the…

Erc721

4 min read

Create NFT with Royalty (EIP-2981)
Create NFT with Royalty (EIP-2981)
Erc721

4 min read


Published in

Coinmonks

·Mar 4, 2022

Attacks on Smart Contract — Chapter 2

Denial of Service (DoS) Attack So what is a Denial of Service attack aka DoS attack? Well, it is an attack that is performed to prevent your smart contract from executing its function accessible to its designated users. Let us take the KingOfEther contract example: The example has two contracts, one is the victim contract that is “KingOfEther.sol” …

Smart Contracts

2 min read

Attacks on Smart Contract — Chapter 2
Attacks on Smart Contract — Chapter 2
Smart Contracts

2 min read


Published in

CoinsBench

·Feb 12, 2022

Attacks on Smart Contract — Chapter 1

Not all your smart contract’s function is accessed by wallet address aka users, sometimes the contract’s function can be accessed by other smart contracts. You should always be aware of your function accessibility, by protecting your functions with relevant access modifiers. Reentrancy Attack Reentrancy attacks are commonly programmed to automatically steal the…

Solidity

2 min read

Attacks on Smart Contract — Chapter 1
Attacks on Smart Contract — Chapter 1
Solidity

2 min read

Nufail.Eth

Nufail.Eth

88 Followers

Blockchain Developer at Niftron | Full-stack Developer| AI and Blockchain Researcher

Following
  • Tom Handy

    Tom Handy

  • Amaanath Mumtaz

    Amaanath Mumtaz

  • Harshita Katiyar

    Harshita Katiyar

  • Sanath Sajeeva Kumara

    Sanath Sajeeva Kumara

  • Kointrack Techsystems

    Kointrack Techsystems

See all (19)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams