CRYPTODEEP
CRYPTODEEP

CRYPTODEEP

Financial security of data and secp256k1 elliptic curve cryptography against weak ECDSA signatures in BITCOIN cryptocurrency [email protected] - Email for all questions. The creators of the software are not responsible for the use of materials Donation Address: ♥ BTC: 1Lw2gTnMpxRUNBU85Hg4ruTwnpUPKdf3nV ♥ETH: 0xaBd66CF90898517573f19184b3297d651f7b90bf ♥ YooMoney.ru/to/410011415370470


Improving the overall security of the ecosystem from attacks on smart contracts

17 Mar 2023 20 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   Front-Running AKA Transaction-Ordering Dependence The University of Concordia considers front-running to be, “a course of action where an entity benefits from prior access to privileged market information about upcoming transa...

Twist Attack example №2 continue a series of ECC operations to get the value of Private Key to the Bitcoin Wallet

2 Mar 2023 4 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will implement a Twist Attack using example #2, according to the first theoretical part of the article, we made sure that with the help of certain points on the secp256k1 elliptic curve, we can get partial va...

How to protect your money in Bitcoin and Ethereum cryptocurrencies in the face of the rapid growth of fake crypto wallets

12 Feb 2023 17 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH The rise of fake cryptocurrency apps and how to avoid them. Scammers are using fake crypto apps to steal funds from investors. Some malicious apps find their way into official app stores. And, according to the latest fraud repor...

Exploit in the cryptocurrency mining code that used a dangerous Log4j vulnerability CVE-2021-44228

31 Jan 2023 37 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH Background on Log4j Alibaba Cloud Security Team publicly disclosed a critical vulnerability (CVE-2021-44228) enabling unauthenticated remote code execution against multiple versions of Apache Log4j2 (Log4Shell). Vulnerable serv...

Twist Attack example №1 perform a series of ECC operations to get the value of Private Key to the Bitcoin Wallet

22 Jan 2023 5 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   Not so long ago, the elliptic (6.5.4) package for standard elliptic curves was vulnerable to various attacks , one of which is the Twist Attack . The cryptographic problem was in the implementation of secp256k1. We know th...

Cold Wallets and Hot Wallets how to find vulnerabilities and eliminate various attacks on the Blockchain

27 Dec 2022 29 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In the last article: “Blockchain Attack Vectors & Vulnerabilities to Smart Contracts” we reviewed all known attacks on the blockchain, in this article we will talk about crypto threats again and we will talk about identifying vu...

Blockchain Attack Vectors & Vulnerabilities to Smart Contracts

19 Dec 2022 16 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will talk about all known attacks on the blockchain, as well as smart contract vulnerabilities. Blockchain isn’t really as secure as we tend to think. Though security is integrated throughout all blockchain t...

Useful tools and services for finding vulnerabilities in a transaction to assess the risk of blockchain and various cryptocurrencies

13 Dec 2022 6 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we have compiled a list of useful tools and services for tracking illegal activities, crypto threats, and finding vulnerabilities in blockchain transactions. Most of the services include a comprehensive hack mon...

BTC Recover Crypto Guide wallet password and seed recovery tools open source

7 Dec 2022 49 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will take a detailed look at the open source password recovery tools and wallet seed phrases in the Crypto Deep Tools repository, and we will also discuss the situation when you accidentally lost or forgot part o...

DeFi Attacks & Exploits all the biggest cryptocurrency thefts from 2021 to 2022

22 Nov 2022 22 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will tell you about the most daring and biggest thefts of cryptocurrencies associated with платформой DeFi. Hackers had a big year in 2021 when they stole $3.2 billion worth of cryptocurrencies. But in 2022, the...