Delving Into the Web3 Industry in Europe: The Emergence of a Hidden Path
In 1492, Columbus set sail from Western Europe and discovered America. Today, America has become an important hub for the development of Web3.
Runtime Environment and Smart Contract Security Modeling
The design and runtime of different blockchains alter the security of smart contracts built on top of them. In this blog post, we will explore how security changes based on different runtime models.
ZKP Series: Pseudonym Input Vulnerability in Circom’s Verification Contract Has Been Replicated
Input pseudonym vulnerability is a frequently encountered vulnerability in zero-knowledge proof and cryptography implementation. Its fundamental cause lies in the value being equivalent to the remainder within the finite field.
What is Privacy in Web3?
An Exploration of the Different Conceptions and Approaches to Privacy in Web3
Bitcoin NFT: A New Trend in the Market
A new trend has appeared on the market — Bitcoin NFT.




