Home » Hackers & Tech Stuff

Hackers & Tech Stuff

Hacks and exploits and how to prevent them and crypto tech details.


What are Crypto Bridges? There are many different crypto tokens and most exist on their own Blockchains. It works exactly as it sounds: a bridge …

Bridge Read More »


A rug pull is when someone pulls whatever firm base you are standing on from underneath you, causing you to fall and crash. Though the …

Rug Read More »

Flash Loan

A flash loan is type of uncollateralized lending that has become popular across a number of decentralized finance (DeFi) protocols based on the Ethereum network. …

Flash Loan Read More »


ERC or Ethereum Request for Comments are technical documents utilized by Ethereum smart contract developers. The documents define rules that are required to be followed …

ERC Read More »


A Denial-of-Service (DoS) attack is a type of attack that is intended to cripple or shut down a machine or network. A DoS attack makes …

DOS Read More »


A collateralized debt position or CDP is held by locking collateral in smart contracts to generate stablecoins. MakerDAO was the first project that introduced CDPs. …

CDP Read More »


2FA is short for Two-Factor Authentication. This is a security measure that lowers the chance of your account being hacked and/or abused. The first factor …

2FA Read More »


The Armor Alliance Bug Bounty Challenge or AABBC was a revolutionary program. ease.org (then Armor) started this program early 2021 to stress the importance of …

AABBC Read More »

Black Hat

A black hat is a type of hacker. It is a person who attempts to find computer security vulnerabilities and exploits them for personal financial …

Black Hat Read More »


An automated market maker (AMM) is a system that provides liquidity to the decentralized exchange (DEX) it operates in through automated trading. The AMM powers …

AMM Read More »

Atomic swaps

Atomic swaps are automatic exchanges of cryptocurrency between two parties on two different blockchains without having to go through a centralized intermediary. The biggest advantage …

Atomic swaps Read More »

51% attack

A 51% attack refers to a malicious actor (or group acting in concert), controlling over 50% of the total mining power of the blockchain network …

51% attack Read More »


Doxxing (or doxing) is the publication of personal details of a previously anonymous person. “The team is fully doxxed” means that there are no “anon” …

Doxxing Read More »


A peer-to-peer exchange that allows buyers and sellers to trade cryptocurrency directly with each other, without the need for an intermediary. This is the opposite …

DEX Read More »


Centralized exchanges (CEXs) are a type of cryptocurrency exchange that a company owns and operates in a centralized manner. Examples: Coinbase, Binance. Advantages of a …

CEX Read More »


An exploit is a piece of code, data, or a sequence of commands that takes advantage of a bug or vulnerability in an application, protocol, …

Exploit Read More »

Bug Bounty

A bug bounty or bug bounty program is a reward for finding and reporting a bug in a particular software product. The bounty programs attract …

Bug Bounty Read More »


Auditing refers to a project using a professional third party to evaluate the soundness of its code and hunt for potential weak points.


Arbitrage is the practice of quickly buying and selling the same asset in different markets to take advantage of price differences between these markets. So, …

Arbitrage Read More »

Scroll to Top