Adrian β©οΈ Hetman πΊβοΈ
Teaching and tweeting about #Web3 and Web3 #Security | Tech Lead of the Triaging team @immunefi | Lunarpunk π | Shadowban walker π₯· |πΌ| Views are my own
View on πThreads
π§΅Long-term bug bounty hunting motivation and engagement might be difficult to maintain, but the following strategies might be helpful. https://t.co/zNwYltldVI
What are the most common smart contracts vulnerabilities?π§ Many of the examples will be well known to people familiar with the web3 security. What makes this interesting, is how...
Let's talk Cross-Chain Bridges. The demand for moving gained/earned assets on one network to another increases every day. The amount flowing through bridges is enormous. There i...
Crypto folks are targetted more and more by spear phishing campaings. Some of them are clever, some of them are just working on human greed. Here is the list of all phishing atte...
How to make a jump from Web2 hacking to Web3 hacking? This is the question I started getting over DMs and I decided to answer all of them in a form of a Twitter thread so other c...
(1/n) Ethereum, while being an extremely versatile blockchain, still has significant usability constraints. Ethereum has trouble with scaling, that is, handling an increasing numb...