Published inmixbytesRandom numbers and decentralized networks: implementationHow to implement publicly verifiable random beacons in blockchainsMay 29, 20192May 29, 20192
Published inmixbytesRandom numbers and decentralized networks: practical applicationIn this article we will focus on collective random number generation in untrusted environment and practical applications in blockchainsApr 18, 20191Apr 18, 20191
Published inmixbytesA Practical Guide to Smart Contract Security Tools. Part 3: MythrilMythril: an open-source security analysis tool for Ethereum smart contracts. This article is about using it in a real smart contract auditMar 5, 20191Mar 5, 20191
Published inmixbytesA Practical Guide to Smart Contract Security Tools. Part 2: SlitherAnalyzer: SlitherJan 31, 20191Jan 31, 20191
Published inmixbytesA Practical Guide to Smart Contract Security Tools. Part 1: IntroductionIntroductionJan 31, 2019Jan 31, 2019
Published inmixbytesEther janitors and “greed-powered” garbage collectionDo you know, that there are miners, processing their own zero-fee transactions? Why? And how to make them work for us?Jan 10, 2019Jan 10, 2019
Published inmixbytesOne Billion Deals On Smart ContractsSmart-contracts adoption, when?Dec 18, 2018Dec 18, 2018
Published inHackerNoon.comEvolution of Airdrop: from Common Spam to the Merkle TreeWith a good algorithm, you can simultaneously solve several problems associated with smart contracts that work with large lists of user…Aug 8, 20181Aug 8, 20181
Simple and Powerful Short-Term Smart ContractsRecently, smart contracts have been widely used in the Ethereum network, mainly for ICO and management of released tokens. Such contracts…Apr 4, 20183Apr 4, 20183