Alae Eddine Lahlali (@aladinlahlali) 's Twitter Profile
Alae Eddine Lahlali

@aladinlahlali

sometimes accurate

ID: 781044387530825729

calendar_today28-09-2016 08:14:28

28 Tweet

21 Takipçi

720 Takip Edilen

Alae Eddine Lahlali (@aladinlahlali) 's Twitter Profile Photo

The Squid token was launched as the exclusive coin of the Squid Game project – a crypto play-to-earn platform but users are not able to sell this token on Pancakeswap, they have not yet understood the rules of the game 😂

The Squid token was launched as the exclusive coin of the Squid Game project – a crypto play-to-earn platform but users are not able to sell this token on Pancakeswap, they have not yet understood the rules of the game 😂
Alae Eddine Lahlali (@aladinlahlali) 's Twitter Profile Photo

#Attack vector: #Malicious signer The proposed solution is that given a list of N authorized signers, any signer may only mint 1 block out of every K. This ensures that damage is limited, and the remainder of the miners can vote out the malicious user.

Alae Eddine Lahlali (@aladinlahlali) 's Twitter Profile Photo

#Attack vector: #Censoring signer Should restrict the allowed minting frequency of signers to 1 out of N/2 This ensures that malicious signers need to control at least 51% of signing accounts.

Louie Bacaj (@lbacaj) 's Twitter Profile Photo

I managed multiple engineering teams before quitting big tech. Now that I quit, I can speak freely. Here are 12 things your manager may not be telling you, but I know for a fact will help you. 👇

Point Network (@pointnetwork) 's Twitter Profile Photo

#Web3 is not about monkey pictures. #Web3 is next-gen internet, finally curbing censorship and mass-surveillance. And it's finally been built: - a web3 browser - decentralized social media - decentralized end-to-end encrypted Point Mail - decentralized Point Drive - and more:

Stiaan Wolfaardt (@stiaanw) 's Twitter Profile Photo

I just completed "Design Systems with React & Storybook" by Emma Bostian on Frontend Masters 💻✨! frontendmasters.com/courses/design… Very cool for those who want to learn some design jargon and dip their toes into Storybook! Storybook React

Abdel SGHIOUAR (@boredabdel) 's Twitter Profile Photo

I’m giving two talks DevoxxMa 🇲🇦 November 12-14, 2025 this year A deep dive into Service Mesh with Istio on Tuesday Oct 4th at 2:00PM. A session on why probably DON’T need a Service Mesh on Thursday Oct 6th at 9:30AM. Check the schedule buff.ly/3SxArVS #DevoxxMA #DevoxxMA2022

I’m giving two talks <a href="/devoxxMA/">DevoxxMa 🇲🇦 November 12-14, 2025</a> this year

A deep dive into Service Mesh with Istio on Tuesday Oct 4th at 2:00PM.

A session on why probably DON’T need a Service Mesh on Thursday Oct 6th at 9:30AM.

Check the schedule buff.ly/3SxArVS

 #DevoxxMA #DevoxxMA2022
Siva (@sivalabs) 's Twitter Profile Photo

Build and deploy a Spring Boot application to AWS App Runner with a CI/CD pipeline using Terraform aws.amazon.com/blogs/containe…

Alex Xu (@alexxubyte) 's Twitter Profile Photo

An API gateway typically provides several important functions. - authentication and security policy enforcement - load balancing - protocol translation and service discovery - monitoring, logging - caching Watch the whole video here: bit.ly/3FAqgwy

An API gateway typically provides several important functions.

- authentication and security policy enforcement
- load balancing
- protocol translation and service discovery
- monitoring, logging
- caching

Watch the whole video here: bit.ly/3FAqgwy
Alex Buraks (@alex_buraks) 's Twitter Profile Photo

There are 10+ yandex ranking factors for URLs, imho almost same best practices can be used in Google. I combined all of them together [🧵mini thread]

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Cryptocurrency Attack OSINT #infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cryptocurrency #Bitcoin #bugbounty #bugbountytips

Cryptocurrency Attack OSINT

#infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cryptocurrency #Bitcoin  #bugbounty #bugbountytips