Security

The Web3 world is filled with both opportunities and risks. This topic will provide you with a comprehensive analysis of security incidents in Web3, uncover common attack methods and vulnerabilities, and offer practical asset protection strategies and guidance.

Articles (157)

How to Achieve an Account-Centric Web3 Ecosystem?
Beginner

How to Achieve an Account-Centric Web3 Ecosystem?

OneBalance is a framework for creating and managing cross-chain accounts, enabling chain abstraction through an account-centric ecosystem. This article discusses how the OneBalance framework facilitates the transition of the Web3 ecosystem from a chain-centric to an account-centric model.
2024-07-12 14:09:46
 A New Perspective on Public Chains by Movement: Can Introducing Move into EVM Redefine Ethereum and Move?
Intermediate

A New Perspective on Public Chains by Movement: Can Introducing Move into EVM Redefine Ethereum and Move?

Unlike Aptos, Sui, and Linera, which are all L1 public chains based on the Move language, the new generation Movement is focusing on L2. It has launched the first Ethereum L2 based on the Move language, aiming to leverage the underlying execution performance and security advantages of Move and further integrate the ecological advantages of EVM. This allows developers to launch Solidity projects on M2 without writing Move code.
2024-07-10 18:35:14
Comprehensive Guide to Fully Homomorphic Encryption (FHE)
Beginner

Comprehensive Guide to Fully Homomorphic Encryption (FHE)

Fully Homomorphic Encryption (FHE) represents the cutting edge of privacy protection technology. It offers exceptional privacy safeguards and can be utilized in Web3 for securing transaction privacy, protecting AI data, and enhancing privacy in co-processing units.
2024-07-10 02:01:38
False Chrome Extension Stealing Analysis
Advanced

False Chrome Extension Stealing Analysis

Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.
2024-06-12 15:26:44
Identifying and Preventing Address Poisoning Attacks
Intermediate

Identifying and Preventing Address Poisoning Attacks

In this in-depth research, we will examine recent high-profile events, get to the bottom of this sneaky attack, and provide you with the knowledge you need to protect your digital assets.
2024-06-11 16:02:37
Analysis of the Sonne Finance Attack
Intermediate

Analysis of the Sonne Finance Attack

The essence of this attack lies in the creation of the market (soToken), where the attacker performed the first collateral minting operation with a small amount of the underlying token, resulting in a very small "totalSupply" value for the soToken.
2024-06-11 06:38:14
What is a Crypto Card and How Does it Work? (2025)
Beginner

What is a Crypto Card and How Does it Work? (2025)

In 2025, crypto cards have revolutionized digital payments, with Gate Crypto Card leading the market through unprecedented innovation. Now supporting over 3000 cryptocurrencies across multiple blockchains, these cards feature AI-powered exchange rate optimization, biometric security, and customizable spending controls. Gate's improved reward structure offers up to 8% cashback, while integration with major digital wallets enables acceptance at 90 million merchants worldwide. The enhanced user experience includes real-time transaction tracking, spending analytics, and automated tax reporting. With competitive advantages over other platforms, Gate Crypto Card demonstrates how the bridge between traditional finance and digital assets has strengthened, making cryptocurrency more accessible and practical for everyday use than ever before.
2023-05-18 06:32:33