nonse.eth ⟠ (@nonseodion) 's Twitter Profile
nonse.eth ⟠

@nonseodion

Smart Contract Security Researcher | Subscribe to my Security newsletter rehackt.substack.com

ID: 862618339289571331

linkhttps://rehackt.substack.com/ calendar_today11-05-2017 10:40:13

4,4K Tweet

1,1K Takipçi

1,1K Takip Edilen

Juan Blanco ☀️☀️🍞🍞🦇🔊 (@juanfranblanco) 's Twitter Profile Photo

The extension that was impersonating vscode solidity (and many others following the same pattern) have been removed. We have seen that a fake extension or virus can spam many downloads (if that was their technique). So how to identify is the right extension? The best way is to

The extension that was impersonating vscode solidity (and many others following the same pattern) have been removed. We have seen that a fake extension or virus can spam many downloads (if that was their technique). So how to identify is the right extension? The best way is to
nonse.eth ⟠ (@nonseodion) 's Twitter Profile Photo

I saw an incorrect statement in chapter 17 of the Rust book where they said the iterator map method calls next under the hood. Raced to Github to raise an issue, searched if already raised. Fortunately, someone had raised it github.com/rust-lang/book…, gave a👍🏿. Back to reading.

I saw an incorrect statement in chapter 17 of the Rust book where they said the iterator map method calls next under the hood. Raced to Github to raise an issue, searched if already raised. 

Fortunately, someone had raised it github.com/rust-lang/book…, gave a👍🏿. Back to reading.
nonse.eth ⟠ (@nonseodion) 's Twitter Profile Photo

If you have a Caldera airdrop but your wallet is hacked, and your cooldown period is almost over, you can claim it with this script. github.com/nonseodion/Cal… It’s really easy to run. Check the Readme.

Art Of Auditing (@artofauditing) 's Twitter Profile Photo

🧙‍♂️Wise sage nonse.eth ⟠ once sad: 🧠 Mitigations are a good place to start looking for bugs. 📜 "A mitigation can fix a bug, partially fix a bug, not fix a bug or expose another vulnerability in the code. It can a..."👇 web3-sec.gitbook.io/art-of-auditin…

Vladimir S. | Officer's Notes (@officer_cia) 's Twitter Profile Photo

Please support my work on OpSec & privacy. I am not a whale at all (feel free to cross-verify) and need your support. The best thing is to support me directly by donating to any address from the list below: 0x1191b7d163bde5f51d4d2c1ac969d514fb4f4c62 or officercia.eth -

nonse.eth ⟠ (@nonseodion) 's Twitter Profile Photo

I am addicted to watching tv shows and I decided to put this addiction into good use by writing. Here’s my piece on Orange Is the New Black. Do subscribe if you like it. open.substack.com/pub/rearviewer…

I am addicted to watching tv shows and I decided to put this addiction into good use by writing. Here’s my piece on Orange Is the New Black.  Do subscribe if you like it. 

open.substack.com/pub/rearviewer…
samczsun (@samczsun) 's Twitter Profile Photo

Raiders a skilled hack will leave no signals or attempts. the fact that hacks leave anything right now is an indictment of the industrys inability to capitalize on them