Phylax Systems (@phylaxsystems) 's Twitter Profile
Phylax Systems

@phylaxsystems

Building verifiable, embedded hack prevention.

ID: 1686426884286926848

linkhttps://phylax.systems/ calendar_today01-08-2023 17:21:48

354 Tweet

2,2K Followers

26 Following

Phylax Systems (@phylaxsystems) 's Twitter Profile Photo

If your contract auto-pauses due to a monitoring tool, your decentralized dApp is trusting a SaaS product with critical functionality.

Defi Security Summit (@summit_defi) 's Twitter Profile Photo

As crypto moves from degen capital to institutional money, the rules of security are changing. At DSS, Odysseus | phylax.systems of Phylax Systems explains what institutional-grade security really means for RWAs, tokenization, and how builders can rise to meet new expectations.

As crypto moves from degen capital to institutional money, the rules of security are changing.

At DSS, <a href="/odysseas_eth/">Odysseus | phylax.systems</a> of <a href="/phylaxsystems/">Phylax Systems</a> explains what institutional-grade security really means for RWAs, tokenization, and how builders can rise to meet new expectations.
Phylax Systems (@phylaxsystems) 's Twitter Profile Photo

Prevent hacks during sequencing with no false positives. dApps define rules rather than depending on ML models to censor transactions.

Solidity (@solidity_lang) 's Twitter Profile Photo

Odysseus | phylax.systems will talk about how the Phylax Credible Layer enables security rules that prevent hacks from being written in Solidity. The talk will first go into how these rules work, then how to implement them, and finally showcase real-world examples.

<a href="/odysseas_eth/">Odysseus | phylax.systems</a> will talk about how the Phylax Credible Layer enables security rules that prevent hacks from being written in Solidity.

The talk will first go into how these rules work, then how to implement them, and finally showcase real-world examples.
Phylax Systems (@phylaxsystems) 's Twitter Profile Photo

It's easier to define the hacked state than find every attack vector. jacob Φ does a great job of demonstrating this through writing and assertion that prevents the hack just by knowing the invariant that was broken.

Odysseus | phylax.systems (@odysseas_eth) 's Twitter Profile Photo

Hiring a based rust engineer with prior blockchain or vm experience. Must be senior, write performance and clean code, but also understand blockchain architectures. prior experience in revm/reth is appreciated it. MEV experience (+ optimizations) is great come protect crypto

Hiring a based rust engineer with prior blockchain or vm experience. Must be senior, write performance and clean code, but also understand blockchain architectures.

prior experience in revm/reth is appreciated it. MEV experience (+ optimizations) is great

come protect crypto
Dan Elitzer (@delitzer) 's Twitter Profile Photo

Some teams spend time posting, others spend time shipping It’s not hard to tell which are going to do better in the long run

jacob Φ (@_czepluch) 's Twitter Profile Photo

The on-chain enforceable rules we're building at Phylax Systems makes more and more sense every day. Instead of spending 1000s of SR hours auditing every possible edge case (you can't), get them to write rules that define what a hack looks like. This way you don't need to