Elliptic: За взломом Harmony One может стоять группа хакеров Lazarus

Elliptic: За взломом Harmony One может стоять группа хакеров Lazarus
фото показано с : bits.media

2022-6-30 12:59

Агентство по кибербезопасности Elliptic в ходе расследования эксплойта и методов отмывания денег, похищенных при взломе моста Harmony One, обнаружило «северокорейский след» Lazarus.

Аналог Notcoin - Blum - Играй и зарабатывай Монеты

источник »

Miner One token (MIO) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 0 MIO

one elliptic lazarus harmony похищенных денег методов

one elliptic → Результатов: 12


In-person meatspace protocol to prove unconditional possession of a private key

Recommended pre-reading: https://ethresear. ch/t/minimal-anti-collusion-infrastructure/5413 Alice slowly walks down the old, dusty stairs of the building into the basement. She thinks wistfully of the old days, when quadratic-voting in the World Collective Market was a much simpler process of linking her public key to a twitter account and opening up metamask to start firing off votes.

2019-10-2 04:03


Understanding PLONK

Special thanks to Justin Drake, Karl Floersch, Hsiao-wei Wang, Barry Whitehat, Dankrad Feist, Kobi Gurkan and Zac Williamson for review Very recently, Ariel Gabizon, Zac Williamson and Oana Ciobotaru announced a new general-purpose zero-knowledge proof scheme called PLONK, standing for the unwieldy quasi-backronym “Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge”.

2019-9-24 04:03


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency.

2018-7-21 23:03