Sirwin
Sirwin
CRYPTODEEP
CRYPTODEEP

CRYPTODEEP

Financial security of data and secp256k1 elliptic curve cryptography against weak ECDSA signatures in BITCOIN cryptocurrency [email protected] - Email for all questions. The creators of the software are not responsible for the use of materials Donation Address: ♥ BTC: 1Lw2gTnMpxRUNBU85Hg4ruTwnpUPKdf3nV ♥ETH: 0xaBd66CF90898517573f19184b3297d651f7b90bf ♥ YooMoney.ru/to/410011415370470


Cryptanalysis of the DAO exploit & Multi-Stage Attack

27 Jun 2023 27 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH     In this article, we will look at a bug in the DAO code. The hacker exploited a bug in the code of the DAO and stole more or less $50 million worth of ether. I will focus here only on the main technical issue of the exploit: T...

Phenomenon from Blockchain Cryptocurrency Solidity Vulnerable Honeypots

22 Jun 2023 32 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   Following the article: “Solidity Forcibly Send Ether Vulnerability to a Smart Contract continuation of the list of general EcoSystem security from attacks”. In this article, we will continue this topic related to vulnerabilities a...

Solidity Forcibly Send Ether Vulnerability to a Smart Contract continuation of the list of general EcoSystem security from attacks

5 Jun 2023 5 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   Earlier we touched on the topic: “Improving the overall security of the ecosystem from attacks on smart contracts”. In this article, we will continue to develop this painful topic of ecosystem security. Occasionally, it is unwa...

ChatGPT as artificial intelligence gives us great opportunities in the security and protection of the Bitcoin cryptocurrency from various attacks

11 May 2023 31 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH Bitcoin is an example of a decentralized network. There are no people or organizations that control it. This is part of its architecture. For many, the creation of Bitcoin Cash under the pretext that blocks with more memory would...

Install SageMath in Google Colab

14 Apr 2023 1 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will do a fresh install SageMathin Google Colab. We previously published an article: “ Install SageMath for cryptanalysis on Fedora 64bit(10GB) Cloud Virtual Server ”, but in order to continue cryptanalysis o...

Install SageMath for cryptanalysis on Fedora 64bit(10GB) Cloud Virtual Server

9 Apr 2023 1 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will show in detail on slides how to install “SageMath” on a Fedora 30 64bit (10GB) cloud virtual server. For example, we will use the “DIGITAL RUBLE TECH” server . Previously, we used the Google Colab clo...

Improving the overall security of the ecosystem from attacks on smart contracts

17 Mar 2023 20 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   Front-Running AKA Transaction-Ordering Dependence The University of Concordia considers front-running to be, “a course of action where an entity benefits from prior access to privileged market information about upcoming transa...

Twist Attack example №2 continue a series of ECC operations to get the value of Private Key to the Bitcoin Wallet

2 Mar 2023 4 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH In this article, we will implement a Twist Attack using example #2, according to the first theoretical part of the article, we made sure that with the help of certain points on the secp256k1 elliptic curve, we can get partial va...

How to protect your money in Bitcoin and Ethereum cryptocurrencies in the face of the rapid growth of fake crypto wallets

12 Feb 2023 17 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH The rise of fake cryptocurrency apps and how to avoid them. Scammers are using fake crypto apps to steal funds from investors. Some malicious apps find their way into official app stores. And, according to the latest fraud repor...

Exploit in the cryptocurrency mining code that used a dangerous Log4j vulnerability CVE-2021-44228

31 Jan 2023 37 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH Background on Log4j Alibaba Cloud Security Team publicly disclosed a critical vulnerability (CVE-2021-44228) enabling unauthenticated remote code execution against multiple versions of Apache Log4j2 (Log4Shell). Vulnerable serv...