Cointime

Download App
iOS & Android

RECENT

Best Tools for Tracking Top Crypto Wallets

Transparency is one of the key advantages of using blockchain technology. For those interested in following the movements of top crypto wallets, whether it be for research, investment purposes, or simply curiosity, there are several powerful tools available to help.
Best Tools for Tracking Top Crypto Wallets

Top 10 Security Tips for BNB Chain Builders

BNB Chain is one of the most in-demand blockchains in the Web3 world thanks to its low fees, fast transactions, and rich ecosystem of projects. As with any blockchain, it's important for builders on BNB Chain to prioritize security in their development process, as any loss of user funds leads to the erosion of confidence in protocols and platforms.
Top 10 Security Tips for BNB Chain Builders

Diamond Proxy Contracts: Best Practices

Proxy contracts are important tools for smart contract developers. Various proxy patterns have emerged to standardize the usage and implementation of proxy contracts. We have previously outlined upgradeable proxy contract security best practices. In this article, we introduce another proxy pattern that has gained traction in the developer community, the Diamond proxy pattern.
Diamond Proxy Contracts: Best Practices

Data, Not Dollars: The Ongoing Threat of Data Breaches in Web3

Web3 has seen numerous major breaches in its history, ranging from centralized exchanges losing private keys to investors losing their personal data. Data breaches pose long-term risks to impacted users, as data can linger for years in online hacker forums and dark web markets.
Data, Not Dollars: The Ongoing Threat of Data Breaches in Web3

What is Multi-Party Computation (MPC)?

Multi-Party Computation (MPC) is a mathematical approach used in cryptography that has the ultimate goal of having a cryptographic operation computed by multiple entities while ensuring that their inputs stay private and are not shared with any third party.
What is Multi-Party Computation (MPC)?

Social Media Crypto Scams

Overall, more than one in four people who reported losing money to all types of fraud in 2021 reported that it started on social media with an ad, post, or a message. The amount lost to social media scams in 2021 was five times that of 2020, and six times from 2018.
Social Media Crypto Scams

A Grey Area: Retroactive Bug Bounty Negotiations

Between October 2020 and March 2023 there have been 25 exploits of Web3 projects where the impacted projects were later able to recover some or all of the funds lost. Across these 25 incidents approximately $1.35 billion was stolen, and $992 million (73%) was returned.
A Grey Area: Retroactive Bug Bounty Negotiations

KYC'd Wallet Sales on Dark Net Markets

The sale of cryptocurrency exchange accounts that have passed Know Your Customer (KYC) verification happens across a multitude of platforms, including Telegram and Discord.
KYC'd Wallet Sales on Dark Net Markets

Fortifying ZenGo: Unearthing and Defending Against Privileged User Attacks

ZenGo is a secure cryptocurrency wallet that uses multi-party computation (MPC) technology. CertiK's SkyFall team conducted a thorough review of many mobile wallets and found that ZenGo's MPC solution provides stronger security defenses than regular mobile wallets.
Fortifying ZenGo: Unearthing and Defending Against Privileged User Attacks

Modal Phishing in Web3 Mobile Wallets

Attackers can send crafted messages to mobile wallets, impersonating a legitimate dApp and tricking victims into approving transactions by showing misleading information in the modal of mobile wallets.
Modal Phishing in Web3 Mobile Wallets
CertiK
Validated Project
Founded in 2018 by professors of Columbia and Yale, CertiK is a pioneer in blockchain security, utilizing best-in-class Formal Verification and AI technology to secure and monitor blockchains, smart contracts, and Web3 apps.