Cointime

Download App
iOS & Android

Blockchain

ALL From Blockchain

Delving Into the Web3 Industry in Europe: The Emergence of a Hidden Path

In 1492, Columbus set sail from Western Europe and discovered America. Today, America has become an important hub for the development of Web3.
Delving Into the Web3 Industry in Europe: The Emergence of a Hidden Path

Runtime Environment and Smart Contract Security Modeling

The design and runtime of different blockchains alter the security of smart contracts built on top of them. In this blog post, we will explore how security changes based on different runtime models.
Runtime Environment and Smart Contract Security Modeling

ZKP Series: Pseudonym Input Vulnerability in Circom’s Verification Contract Has Been Replicated

Input pseudonym vulnerability is a frequently encountered vulnerability in zero-knowledge proof and cryptography implementation. Its fundamental cause lies in the value being equivalent to the remainder within the finite field.
ZKP Series: Pseudonym Input Vulnerability in Circom’s Verification Contract Has Been Replicated

What is Privacy in Web3?

An Exploration of the Different Conceptions and Approaches to Privacy in Web3
What is Privacy in Web3?

Bitcoin NFT: A New Trend in the Market

A new trend has appeared on the market — Bitcoin NFT.
Bitcoin NFT: A New Trend in the Market