DLITE (@dlite_official) 's Twitter Profile
DLITE

@dlite_official

Blockchain Dev || whitehat @immunefi || SR (Intern) - Pashov Audit Group|| Technical Writer, @BlockchainAlpha

dliteofficial.hashnode.dev

ID: 1149446284866129920

calendar_today11-07-2019 22:32:04

1,1K Tweet

443 Takipçi

611 Takip Edilen

random guy on the internet (@kharaykraykray) 's Twitter Profile Photo

In Rust, each value has one owner responsible for it. Ownership can be moved but not copied. Borrowing lets you use a value without taking ownership: immutable borrows allow multiple readers, while mutable borrows allow one writer at a time, ensuring memory safety without a GC.

nmirchev8 (@nmirchev8) 's Twitter Profile Photo

Avoid using indexed for complex types in Solidity events indexed works great for fixed-size types (uint256, bytes32, etc.), but for dynamic ones (string, bytes, arrays, structs) it only stores the keccak256 hash, not the actual value You can't recover/filter by the real data

DLITE (@dlite_official) 's Twitter Profile Photo

One of the privileges of working as a security researcher is that you don't have to do interviews before you get to work with protocols. Your skills and results speak for themselves

pashov (@pashovkrum) 's Twitter Profile Photo

To this day, just by pure hard work and persistence, you can make it in web3 & crypto, especially in web3 security. If you are reading this, this is your chance to focus, get back on track, and do the work you know you MUST do🫡

DLITE (@dlite_official) 's Twitter Profile Photo

I just took a leap now and submitted an application to Cantina 🪐 for their Fellowship Program (Apprentice). Hopefully, I am considered. Fingers crossed 🤞

Zero Cipher (@zerocipher002) 's Twitter Profile Photo

Here is a very simple Alfa that could 10x the earnings of any person struggling in Web3 Security Competitions: Before even auditing the code, understand the code so deeply such that you are able to implement it from scratch if needed. Resist any urge to analyze any part of the

RareSkills (@rareskills_io) 's Twitter Profile Photo

On the evening of November 20th, RareSkills will launch... Ultimate Security Games Live in Argentina. Smart contract hacking + esports = Ultimate Security Games The hackers will share their screens live, so you'll see their thought process and strategy as they break the

Pyro (@0x3b33) 's Twitter Profile Photo

Auditing methods I've tested: - Top to bottom (and reverse) - Small contracts first (and reverse) - User flows - Internal first - Fast read everything and go deep - Go deep and slow - Start where you like (for the crazy ones) And from all of these tests I've came to the

Jeff Security (@jeffsecurity) 's Twitter Profile Photo

The Pareto Principle hits hard in Web3 auditing: -80% of findings are found with 20% of the effort. -The final 20% of findings demand 80% of the effort. -Yet, those few, deep bugs can make up 100% of the critical prize pot. Don't settle for the low-hanging fruit. Dig deeper. ⛏️