"TABLE"

Resultado de búsqueda de

Cursos (0)

Artículos (495)

Glosario (0)

What Monad Brings to the Table
Beginner

What Monad Brings to the Table

This article introduces the blockchain project Monad, which, through a series of innovations, fully harnesses the potential of the EVM, creating a high-throughput L1 blockchain.
2/27/2024, 8:10:10 AM
Bitcoin self-custody approaches compared
Beginner

Bitcoin self-custody approaches compared

This article explains various methods of key management, ranging from simple to advanced (including multisignature), and provides a table for comparison.
1/19/2024, 12:58:29 AM
Soft-Fork/Covenant Dependent Layer 2 Review
Advanced

Soft-Fork/Covenant Dependent Layer 2 Review

Our goal here is to do an overview of all these proposals, figure out what technical patterns they share, figure out what kinds of new opcodes and other soft fork upgrades they need to function, and create a comparison table of how all the parts fit together. Along the way we’ll also define what an L2 protocol actually is, what kind of scaling Lightning is already capable of, and get an understanding of what improvements we need to do to mempools to achieve all this.
10/7/2024, 10:41:34 AM
In-depth Analysis of Two ZK Vulnerabilities
Intermediate

In-depth Analysis of Two ZK Vulnerabilities

This article provides an in-depth analysis of two potential vulnerabilities in Zero-Knowledge Proof (ZKP) systems: the "Load8 Data Injection Attack" and the "Forgery Return Attack." The article details the technical specifics of these vulnerabilities, how they can be exploited, and the methods for fixing them. Additionally, it discusses the lessons learned from discovering these vulnerabilities during the auditing and formal verification processes of ZK systems and suggests best practices for ensuring the security of ZK systems.
6/5/2024, 1:46:28 PM
The risks of LRTs
Advanced

The risks of LRTs

Through case studies, this article highlights the liquidity and yield characteristics of LST and LRT, and provides methods for constructing a diversified investment portfolio. Investors should be aware of the risks, continually learn and update their knowledge to make informed investment decisions.
3/8/2024, 1:14:19 AM
Will Scroll Drive the Layer2 Wave?And The zkEVM Circuits and Audit You Need To Know
Intermediate

Will Scroll Drive the Layer2 Wave?And The zkEVM Circuits and Audit You Need To Know

This article provides a detailed analysis of the architecture and technology of Scroll, helping readers understand the current network status and future development directions of Scroll. It also explains the Scroll zkEVM circuits and audits.
12/27/2023, 8:51:08 AM
How to Read Block Explorers and Understand Transactions, Traces, and Logs on Ethereum (EVM)
Advanced

How to Read Block Explorers and Understand Transactions, Traces, and Logs on Ethereum (EVM)

Learn read explorers like Etherscan and navigate data across these three key data structures, and how to find the tables you'll need to query.
9/13/2024, 10:21:24 PM
What Is Driving the Bull Market in Crypto? Is It Technological Upgrades?
Intermediate

What Is Driving the Bull Market in Crypto? Is It Technological Upgrades?

This article analyzes the causal relationship between GitHub development activity and token price fluctuations, highlighting the role of "technical development" as a fundamental factor in the cryptocurrency market.
12/28/2023, 8:18:00 AM
MicroStrategy Debt Risk Analysis
Advanced

MicroStrategy Debt Risk Analysis

This article examines MicroStrategy's outstanding bonds, their structure, and convertibility options. Based on the current debt structure, forced selling of Bitcoin holdings to finance cash redemption of the bonds remains unlikely.
11/26/2024, 1:56:24 AM
A Social and Financial Study of Memecoins
Intermediate

A Social and Financial Study of Memecoins

In the cryptocurrency space, promoting meme coins has become a popular market strategy to rally users and boost the price of a particular asset. This article analyzes how to measure a meme coin using financial and social indicators, and observes data such as trading volume and liquidity through on-chain monitoring tools.
5/5/2024, 3:19:28 PM
Top Wrapped Bitcoin (WBTC) Alternatives You Should Know About
Beginner

Top Wrapped Bitcoin (WBTC) Alternatives You Should Know About

Several WBTC alternatives have emerged to bring Bitcoin liquidity to DeFi ecosystems across the cryptoverse. Discover the most prominent ones in this guide.
10/12/2024, 12:53:10 AM
In-Depth Investigation of Rug Pull Scams: Exposing the Turmoil in Ethereum's Token Ecosystem
Intermediate

In-Depth Investigation of Rug Pull Scams: Exposing the Turmoil in Ethereum's Token Ecosystem

The CertiK team found that nearly half of the newly issued Ethereum tokens in the Web3 space are linked to Rug Pull scams. These scams are carried out by organized groups who use liquidity holding addresses for money laundering and risk management. The majority of the funds involved come from centralized exchanges. The article concludes with a warning to users to stay alert and avoid being scammed.
1/13/2025, 1:24:37 PM
Exploration of the Use of Basic Economic Theories in Blockchain Economic Model Design
Advanced

Exploration of the Use of Basic Economic Theories in Blockchain Economic Model Design

This article summarizes the design of blockchain economic models, discussing perspectives from psychology, individual economics, macroeconomics, and game theory, concluding with a case study analysis of airdrop design.
1/31/2024, 7:19:10 AM
YGG Research Report: In-depth understanding of operating methods and investment concepts
Beginner

YGG Research Report: In-depth understanding of operating methods and investment concepts

This report analyzes the performance of YGG, a guild leader in the chain game field, in a bear market, and explores the data reasons behind it and the effectiveness of the business model. Further expansion to YGG's competitors and the entire GameFi Gold Club circuit provides an analysis of YGG's team, tokens, and operating mechanisms.
12/17/2023, 4:01:36 PM
Analysis of Bitcoin Layer 2 Scaling Technology: Validity Proof and Fraud Proof
Advanced

Analysis of Bitcoin Layer 2 Scaling Technology: Validity Proof and Fraud Proof

Get an in-depth understanding of the Layer 2 expansion plan in the Bitcoin network, especially the validity proof and fraud proof technology. This article analyzes how to achieve Layer 2 expansion through technological innovation under the strict restrictions of Bitcoin, including Bit Commitment, Taproot, and Connector Output. and contracts, etc.
10/22/2024, 6:28:13 AM

Su puerta de entrada al mundo de las criptomonedas: suscríbase a Gate para una nueva perspectiva.

Su puerta de entrada al mundo de las criptomonedas: suscríbase a Gate para una nueva perspectiva.