The document discusses different types of "honeypot" smart contracts on Ethereum that are designed to trap unwary attackers. It describes 7 different honeypot patterns: 1) invisible codes that trap funds, 2) an unfair equation, 3) invisible function calls, 4) useless ownership transfers, 5) a math trick, 6) early termination of loops, and 7) exploitation of an old compiler version. The purpose of these honeypots is to lock up the funds of naïve attackers without actually being vulnerable contracts.
Killer Design Patterns for F2P Mobile/Tablet GamesHenric Suuronen
Presentation on Design Patterns for Mobile and Tablet games presented in July 2013 at ChinaJoy in Shanghai by Henric Suuronen, President & Co-Founder at Nonstop Games
Chasing Elephants - Alberto Brandolini - Codemotion Rome 2017Codemotion
Developers suffer from dangerous addictions. They draw pleasure in making things work. When this doesn't happen this could lead to dramatic consequences. Developers deprived of the possibility of making things work could start exposing dangerous behaviours like challenging authority and mainstream thinking. In extreme cases, they may even fall into the abyss of asking the forbidden question: "Why?"
[CB19] I KNOW WHAT YOU DID LAST NIGHT : Pwning The State-Of-The-Art the IoT H...CODE BLUE
With the emergence of IoT, which stands for Internet of Things, our daily life is being convenient more than ever. IoT market today grow continuously. To manage a plethora of IoT devices at once, it is changing to the way to control all IoT devices easily and conveniently, rather than operating IoT devices independently. Since the IoT Hub can control the connected IoT devices, it is at high risk for serious damage such as malicious control by an attacker, privacy invasion, leakage of personal information in case of security breaches.
We will present the overall process of exploitation in IoT hub from acquiring root shells to analyzing the multiple IoT Hub firmware for showing how we derive the vulnerabilities. We made a data flow diagram(called as DFD) through the network packet analysis, firmware analysis, security threats we defined, and vulnerabilities. Subsequently, We will also discuss the vulnerabilities found in recently commercialized IoT Hub, and introduce the critical threats that could be derived from the vulnerabilities.
Finally we will show the live demonstration of the full-chain exploitation scenarios in smart home such as “opening door lock, sniffing password and Eavesdropping through the device's microphone control”. By doing so, we will contribute improvement of the security of IoT Network and smart home with the awareness of the threats of IoT Hub.
Building a Mobile, Social, Location-Based Game in 5 WeeksJennie Lees
A 5-week experiment to practice Lean methods in game development by testing and iterating concepts around mobile, location-based social gaming and apps. Presented at GDC 2011.
Killer Design Patterns for F2P Mobile/Tablet GamesHenric Suuronen
Presentation on Design Patterns for Mobile and Tablet games presented in July 2013 at ChinaJoy in Shanghai by Henric Suuronen, President & Co-Founder at Nonstop Games
Chasing Elephants - Alberto Brandolini - Codemotion Rome 2017Codemotion
Developers suffer from dangerous addictions. They draw pleasure in making things work. When this doesn't happen this could lead to dramatic consequences. Developers deprived of the possibility of making things work could start exposing dangerous behaviours like challenging authority and mainstream thinking. In extreme cases, they may even fall into the abyss of asking the forbidden question: "Why?"
[CB19] I KNOW WHAT YOU DID LAST NIGHT : Pwning The State-Of-The-Art the IoT H...CODE BLUE
With the emergence of IoT, which stands for Internet of Things, our daily life is being convenient more than ever. IoT market today grow continuously. To manage a plethora of IoT devices at once, it is changing to the way to control all IoT devices easily and conveniently, rather than operating IoT devices independently. Since the IoT Hub can control the connected IoT devices, it is at high risk for serious damage such as malicious control by an attacker, privacy invasion, leakage of personal information in case of security breaches.
We will present the overall process of exploitation in IoT hub from acquiring root shells to analyzing the multiple IoT Hub firmware for showing how we derive the vulnerabilities. We made a data flow diagram(called as DFD) through the network packet analysis, firmware analysis, security threats we defined, and vulnerabilities. Subsequently, We will also discuss the vulnerabilities found in recently commercialized IoT Hub, and introduce the critical threats that could be derived from the vulnerabilities.
Finally we will show the live demonstration of the full-chain exploitation scenarios in smart home such as “opening door lock, sniffing password and Eavesdropping through the device's microphone control”. By doing so, we will contribute improvement of the security of IoT Network and smart home with the awareness of the threats of IoT Hub.
Building a Mobile, Social, Location-Based Game in 5 WeeksJennie Lees
A 5-week experiment to practice Lean methods in game development by testing and iterating concepts around mobile, location-based social gaming and apps. Presented at GDC 2011.
This talk from RailsConf 2019 describes how our team made deep changes to the data model of our production system over a period of 2.5 years.
Changing your data model is hard. Taking care of existing data requires caution. Exploring and testing possible solutions can be slow. Your new data model may require data completeness or correctness that hasn't been enforced for the existing data.
To manage the risk and minimize disruption to the product roadmap, we broke the effort into four stages, each with its own distinct challenges. I'll describe our rationale, process ... and the lessons we learned along the way.
SentryPeer, A distributed list of bad IP addresses and phone numbers collecte...Alan Quayle
SentryPeer, A distributed list of bad IP addresses and phone numbers collected via a SIP Honeypot.
Gavin Henry, CIO at TelcoSwitch and SureVoIP Founder.
What is SentryPeer? A distributed list of bad IP addresses and phone numbers collected via a SIP Honeypot.
Why is it different?
Technology Description
Results so far
Please contribute!
TADSummit EMEA Americas 2021
From Crypto Kitties to non fungible token to ERC721 standardmaeste
A bright future for non-fungible tokens in blockchain world. Last January we have seen a new phenomenon in cryptocurrency world: crypto kitties. Everyone in blockchain world would like to buy one, but Kitties was important not only for their popularity but even more for their technology, which started a new kind of token. We will see what a non-fungible token is, its standard ERC721 and its bright future and infinite applications they could have in blockchain world.
Webinar: From Crypto Kitties to non fungible token to ERC721 standard - Stefa...Codemotion
A bright future for non fungible token in blockchain world. Last January we have seen a new phenomenon in cryptocurrency world: crypto kitties. Everyone in blockchain world would like to buy one, but most important also people who don't know what is an ether was talking about (Radio DJ for example). But Kitties was important not only for their popularity but even more for their technology, which started a new kind of token.
We will talk about what is a non fungible token, its standard ERC721 and its bright future and infinite applications they could have in blockchain world.
How to secure your bitcoins. This technical presentation by Kitten Tofu is at a medium-advanced level for those who are deeply involved in bitcoin.
This was presented at the Bitcoin Barcamp in Sydney on 15th March 2014. To view the full talk or find more presentations from Australia's first pop-up unConference on cryptocurrency innovation, go to www.bitcoinbarcamp.org
Moving from boxed title Game Development to F2P | Ralf C. AdamRalf C. Adam
This lecture was held at the Game Developer's Conference GDC Europe in Cologne in 2010. Target Audience: Studios working in the traditional games industry, thinking about switching to development of online F2P titles.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
This talk from RailsConf 2019 describes how our team made deep changes to the data model of our production system over a period of 2.5 years.
Changing your data model is hard. Taking care of existing data requires caution. Exploring and testing possible solutions can be slow. Your new data model may require data completeness or correctness that hasn't been enforced for the existing data.
To manage the risk and minimize disruption to the product roadmap, we broke the effort into four stages, each with its own distinct challenges. I'll describe our rationale, process ... and the lessons we learned along the way.
SentryPeer, A distributed list of bad IP addresses and phone numbers collecte...Alan Quayle
SentryPeer, A distributed list of bad IP addresses and phone numbers collected via a SIP Honeypot.
Gavin Henry, CIO at TelcoSwitch and SureVoIP Founder.
What is SentryPeer? A distributed list of bad IP addresses and phone numbers collected via a SIP Honeypot.
Why is it different?
Technology Description
Results so far
Please contribute!
TADSummit EMEA Americas 2021
From Crypto Kitties to non fungible token to ERC721 standardmaeste
A bright future for non-fungible tokens in blockchain world. Last January we have seen a new phenomenon in cryptocurrency world: crypto kitties. Everyone in blockchain world would like to buy one, but Kitties was important not only for their popularity but even more for their technology, which started a new kind of token. We will see what a non-fungible token is, its standard ERC721 and its bright future and infinite applications they could have in blockchain world.
Webinar: From Crypto Kitties to non fungible token to ERC721 standard - Stefa...Codemotion
A bright future for non fungible token in blockchain world. Last January we have seen a new phenomenon in cryptocurrency world: crypto kitties. Everyone in blockchain world would like to buy one, but most important also people who don't know what is an ether was talking about (Radio DJ for example). But Kitties was important not only for their popularity but even more for their technology, which started a new kind of token.
We will talk about what is a non fungible token, its standard ERC721 and its bright future and infinite applications they could have in blockchain world.
How to secure your bitcoins. This technical presentation by Kitten Tofu is at a medium-advanced level for those who are deeply involved in bitcoin.
This was presented at the Bitcoin Barcamp in Sydney on 15th March 2014. To view the full talk or find more presentations from Australia's first pop-up unConference on cryptocurrency innovation, go to www.bitcoinbarcamp.org
Moving from boxed title Game Development to F2P | Ralf C. AdamRalf C. Adam
This lecture was held at the Game Developer's Conference GDC Europe in Cologne in 2010. Target Audience: Studios working in the traditional games industry, thinking about switching to development of online F2P titles.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. Short Intro
• Jeff Hu
• HKUST / Valley / EPFL / J.P. Morgan / Munich
• à Blackbird.ai / SELF CHAIN
• à Founder of Turing Chain Ltd.
Jeff Hu | 2019
3. Background
• Ethereum
• Programmable blockchain
• Smart Contract
• A set of predefined rules that are immutable
• Honeypots?
• A easy-targeted bait that attackers used to fall for
Jeff Hu | 2018
4. Honeypots Patterns
• A smart contract with explicit vulnerabilities that attracts the naïve
attackers to launch attack against, whereas which locks up the funds
of the attackers.
Jeff Hu | 2018
6. Honeypot #1:
Invisible codes!
• Demo
• Intuition: Call GetFreebie()
with ether > 1 to get all the money!
• Sad fact: Two lines of codes are
hidden by SPACES! The creator get
all the money before any of us does!
Jeff Hu | 2018
7. Honeypot #2:
Unfair equation!
• Demo
• Intuition: Call multiplicate()
with ether > contract balance to get
all the money!
Jeff Hu | 2018
8. Honeypot #2:
Unfair equation!
• Demo
• Intuition: Call multiplicate()
with ether > contract balance to get
all the money!
• Sad fact: this.balance will be
increased before checking the
equation, so this.balance will
always LAREGR than msg.value.
(Equation holds when both are zero)
Jeff Hu | 2018
9. Honeypot #3:
Invisible calls!
• Demo
• Intuition: Check whether the pass
has been set, if not, call
SetPass() with ether >= 1 and
GetGift() to get all the money!
Jeff Hu | 2018
10. Honeypot #3:
Invisible calls!
• Demo
• Intuition: Check whether the pass
has been set, if not, call
SetPass() with ether >= 1 and
GetGift() to get all the money!
• Sad fact: The creator has already set
the pass with INTERNAL CALL from
another contract, but Etherscan
does NOT show internal call with no
value transferred… Never know…
Jeff Hu | 2018
11. Honeypot #4:
Useless ownership!
• Demo
• Intuition: Call
useEmergencyCode() to
become the owner to get all the
money!
Jeff Hu | 2018
12. Honeypot #4:
Useless ownership!
• Demo
• Intuition: Call
useEmergencyCode() to
become the owner to get all the
money!
• Sad fact: The owners of Owned and
TestBank are DIFFERENT! Becoming
the owner of TestBank is useless
bcoz you cannot control the owner
of Owned.
Jeff Hu | 2018
13. Honeypot #5:
Math trick!
• Demo
• Intuition: Keep calling race() to
transfer money until hitting the aim
of SCORE_TO_WIN to get all the
money!
Jeff Hu | 2018
14. Honeypot #5:
Math trick!
• Demo
• Intuition: Keep calling race() to
transfer money until hitting the aim
of SCORE_TO_WIN to get all the
money!
• Sad fact: You can never reach 100
finney because of MATH. J
Jeff Hu | 2018
16. Honeypot #6:
Early termination!
• Demo
• Intuition: Let the iteration rolls and
we will get 2 times the input back!
• Sad fact: Integer OVERFLOW. var i
is uint8 type, which means that
we will only get 510 wei back. (i.e.
255*2 = 510)
Jeff Hu | 2018
17. Honeypot #7:
Old compiler!
• Demo
• Intuition: Looks like a normal
contract that is capable of deposit,
calculate dividends, and withdraw.
Nothing weird. (…pondering)
Jeff Hu | 2018
18. Honeypot #7:
Old compiler!
• Demo
• Intuition: Looks like a normal
contract that is capable of deposit,
calculate dividends, and withdraw.
Nothing weird. (…pondering)
• Sad fact: Visit deployment address
and realize that the compiler is too
old (v0.4.11). The “” mark will be
IGNORED, and thus the target will
switched from us to the owner.
Jeff Hu | 2018
19. Review
• Honeypot #1: Invisible codes
• Honeypot #2: Unfair equation
• Honeypot #3: Invisible calls
• Honeypot #4: Useless ownership
• Honeypot #5: Math trick
• Honeypot #6: Early termination
• Honeypot #7: Old compiler
Jeff Hu | 2018
21. There are more for you to explore!
• Go to Etherscan.io to look for contract examples (or vulnerabilities xd)
• Learn solidity by Crypto Zombies and other resources
• Go to OpenZeppelin to see how the trend goes roughly
• Read smart contract security best practices
Jeff Hu | 2018
22. Make your contract smart and secure
At least make it a honeypot when you no longer want to secure it :P
Jeff Hu | 2018
23. Great references
• thec00n: https://github.com/thec00n/smart-contract-honeypots/
• misterch0c: https://github.com/misterch0c/Solidlity-Vulnerable/
• Gerhard Wagner: https://medium.com/@gerhard.wagner/the-
phenomena-of-smart-contract-honeypots-755c1f943f7b
• brenjerman:
https://www.reddit.com/r/ethereum/comments/7xvoui/exposing_et
hereum_honeypots/
• dawu&0x7F: https://paper.seebug.org/631/
Jeff Hu | 2018