Homepage
Open in app
Sign in
Get started
Positive Web3 Security
Positive.com: Web3 Security
About
Positive.com
Follow
Following
AIRA Lab Robonomics Smart Contracts Audit
AIRA Lab Robonomics Smart Contracts Audit
Positive.com experts have assessed the source code of AIRA Lab Robonomics smart contracts.
Arseniy Reutov
Oct 10, 2018
Positive.com: ICO Projects Contain Five Security Vulnerabilities On Average
Positive.com: ICO Projects Contain Five Security Vulnerabilities On Average
ICO security company launches Chainwatch, a real time monitoring product for ICOs.
PositiveWeb3
Jun 25, 2018
Rewriting History: A Brief Introduction to Long Range Attacks
Rewriting History: A Brief Introduction to Long Range Attacks
Proof of Stake protocols are in the spotlight as more and more high-profile blockchains attempt to switch over from Proof of Work…
Evangelos Deirmentzoglou
May 31, 2018
PHDays 8: EtherHack Contest Writeup
PHDays 8: EtherHack Contest Writeup
This year at PHDays security conference a new contest called EtherHack was held. The goal was to be the first to solve all tasks which…
Arseniy Reutov
May 22, 2018
Predicting Random Numbers in Ethereum Smart Contracts
Predicting Random Numbers in Ethereum Smart Contracts
Ethereum has gained tremendous popularity as a platform for initial coin offerings (ICOs). However, it is used in more than just ERC20…
Arseniy Reutov
Jan 31, 2018
trade.io get their ICO off to a smart start
trade.io get their ICO off to a smart start
The team over at trade.io launched their “Trade Token” ICO on Ethereum on 7th December. Business has been brisk, with early investors…
PositiveWeb3
Dec 28, 2017
Debugging EVM bytecode with radare2
Debugging EVM bytecode with radare2
Let’s continue our journey into the internals of EVM bytecode. In the last post we’ve taken a look at a simple contract and how to reverse…
Fedor Sakharov
Dec 27, 2017
Reversing EVM bytecode with radare2
Reversing EVM bytecode with radare2
Howdy ya’ll. Today we will look into the insides of Ethereum Virtual Machine (EVM), how Solidity language is translated into bytecode, how…
Fedor Sakharov
Dec 20, 2017
Mapping the ICO threat landscape
Mapping the ICO threat landscape
You’re already on the path for an ICO. Along with you, there are numerous people trying to do the same. Not all of them have that great…
Evangelos Deirmentzoglou
Nov 30, 2017
ZeroNights ICO Hacking Contest Writeup
ZeroNights ICO Hacking Contest Writeup
Prior to ZeroNights security conference, an ICO hacking contest had been announced. The first three contestants to solve the tasks could…
Arseniy Reutov
Nov 15, 2017
About Positive Web3
Latest Stories
Archive
About Medium
Terms
Privacy
Teams