Blog

Blockchain

Polygon Zk roll up

Polygon ZK-RollUp: An Incredibly Simple Explanation 

Read Time: 9 minutes Polygon maintains its crown by bringing in ZKrollup. Problem with Ethereum Mainnet Ethereum is the backbone of the web3 ecosystem. It continues to surprise the most brilliant minds in the world with the potential it carries. The potential of diversified applications would make even Einstein scratch his head for a moment. But yeah, it is …

Polygon ZK-RollUp: An Incredibly Simple Explanation  Read More »

Smart Contract on Polygon

Tutorial: Deploying Smart Contracts on Polygon Chain

Read Time: 4 minutes What is Polygon Network? Polygon, formerly known as Matic Network and founded in 2017, has always focused on developing Ethereum scaling architecture. Polygon is a Layer 2 scaling solution for the Ethereum blockchain. Polygon functions as a faster blockchain that runs concurrently with the Ethereum blockchain, which has multiple sidechains. Polygon processes transactions on-chain using …

Tutorial: Deploying Smart Contracts on Polygon Chain Read More »

Proof of Reserve

The Ins And Outs Of Proof-of-Reserves

Read Time: 7 minutes The staggering implosion of FTX, one of the big leagues in the industry, created a tremor that reverberated last week. The market crisis is so deep that the prices of digital currencies were plummeting, with the impact being felt by the world’s biggest cryptocurrencies, such as Bitcoin and Ethereum.  With the crypto investors taken aback …

The Ins And Outs Of Proof-of-Reserves Read More »

Cross Chain Bridge Attack

Summary of Cross-chain Bridge Attacks 2022

Read Time: 6 minutes As newer blockchains continue to launch, cross-chain bridges are becoming more indispensable than ever to enhance the interoperability between blockchain ecosystems.  Having said that, the new innovation also lays the surface for a large number of attack vectors. According to Chainalysis, Cross-chain bridge hacks alone make up to 69% of stolen funds in 2022.  There …

Summary of Cross-chain Bridge Attacks 2022 Read More »

MEV

A Guide To MEV: Critical Issues and Best Security Practices

Read Time: 6 minutes Profit-making is the ultimate aim behind any work that an individual performs. In regard to that, MEV, which stands for Maximal Extractable Value, signifies the profit a validator makes from a smart contract-enabled blockchain for including, excluding or re-ordering transactions in the blocks.  In short, MEV represents the measure of profits that a miner/validator could …

A Guide To MEV: Critical Issues and Best Security Practices Read More »

spoof tokens

Understanding Spoof Tokens and How to Avoid Being Coaxed

Read Time: 5 minutes The safety and security of assets heavily make a difference in how much money the users make from their investments. And so here’s a security blog to stay aware and informed in Web3. Cryptocurrencies are known for their volatility. That tells how much the asset’s price is influential in making investment decisions. There’s a catch …

Understanding Spoof Tokens and How to Avoid Being Coaxed Read More »

Tezos Blockchain

Tezos Blockchain: In-depth Analysis from the Audit Perspective 

Read Time: 5 minutes Tezos blockchain project had a splendid start by raising $232 million with the Initial Coin Offering, obtaining second place in receiving the biggest funds among the 20 largest ICOs. Amongst the most popular blockchain networks, such as Ethereum or Bitcoin, how was Tezos able to gain all the hype? To find out the answer, let’s …

Tezos Blockchain: In-depth Analysis from the Audit Perspective  Read More »

Cybersecurity Concern

A Swift Movement of Cybersecurity Concerns from Web2 to Web3 

Read Time: 10 minutes A lot of Web3 adoption today is sought by Web2 companies who want to add web3 native features to their existing products. But wait, what does the web3 revolution brings to the table? To understand the vitality that Web3 possess, let’s trace the progression achieved by web iterations over the years.  Web1 – popularly addressed …

A Swift Movement of Cybersecurity Concerns from Web2 to Web3  Read More »

BSC Hack

The Million Dollars BSC Token Hub Bridge Hack Analysis

Read Time: 4 minutes Summary: On 7th October 2022, there was an exploit affecting the native cross-chain bridge called “BSC Token Hub”. The bug is in the proof verifier of the bridge. A total of 2 million BNB was withdrawn and Binance temporarily paused BSC Network to prevent further damages. Funds taken off BSC are estimated between $100M – …

The Million Dollars BSC Token Hub Bridge Hack Analysis Read More »

Asymmetric Encryption

A Detailed Guide On Asymmetric Encryption And How It Works

Read Time: 4 minutes We are at this time where data are most valuable. Transferring data through blockchain, which operates autonomously, is a question of challenge.  To solve this problem, encryption techniques came into effect where the data/messages are encrypted into some random letters and numbers for them to be decrypted by the receiver. In that way, data are …

A Detailed Guide On Asymmetric Encryption And How It Works Read More »

Become a Quiffiliate!
Join our mission to safeguard web3

Sounds Interesting, Right? All you have to do is:

1

Refer QuillAudits to Web3 projects for audits.

2

Earn rewards as we conclude the audits.

3

Thereby help us Secure web3 ecosystem.

Total Rewards Shared Out: $190K+