Security researcher at @chainlight_io, dedicated to tackling challenging cybersecurity issues and making the world safer. All opinions are

Exploring Blockchain Data Availability and Blobspace with a Deep Dive into Solutions and Strategies
✅ Follow me: X: @Younsle1 Warpcast: @zer0luckSubscribeTL;DR 👀Data availability in blockchain networks is crucial for ensuring accurate and complete information.Full nodes offer the highest security by downloading and verifying all transactions, yet require significant resources.Light clients, with a lower level of security, download only block headers, assuming all transactions are valid.The data availability problem relates to ensuring that all new block data is genuinely published on the n...

Exploring Blockchain Data Availability and Blobspace with a Deep Dive into Solutions and Strategies
✅ Follow me: X: @Younsle1 Warpcast: @zer0luckSubscribeTL;DR 👀Data availability in blockchain networks is crucial for ensuring accurate and complete information.Full nodes offer the highest security by downloading and verifying all transactions, yet require significant resources.Light clients, with a lower level of security, download only block headers, assuming all transactions are valid.The data availability problem relates to ensuring that all new block data is genuinely published on the n...

Study consensus protocol attacks, Long-range attacks, and mitigations
✅ Follow me: X: @Younsle1 Warpcast: @zer0luckGoalDespite the general argument for the adoption of blockchain technology in terms of security, privacy, and immutability, various attacks can occur on blockchain technology in reality. This article summarizes systematic details on Long-Range attacks for Proof-of-Stake protocols. If successful, these attacks can seize the main chain and partially or completely rewrite transaction records stored on the blockchain. To do this, we will explain blockc...

Study consensus protocol attacks, Long-range attacks, and mitigations
✅ Follow me: X: @Younsle1 Warpcast: @zer0luckGoalDespite the general argument for the adoption of blockchain technology in terms of security, privacy, and immutability, various attacks can occur on blockchain technology in reality. This article summarizes systematic details on Long-Range attacks for Proof-of-Stake protocols. If successful, these attacks can seize the main chain and partially or completely rewrite transaction records stored on the blockchain. To do this, we will explain blockc...

Study on Blockchain Infrastructure and Consensus Protocol Security.
GoalDespite the general argument for the adoption of blockchain technology in terms of security, privacy, and immutability, various attacks can occur on blockchain technology in reality. This article summarizes systematic details on Long-Range attacks for Proof-of-Stake protocols. If successful, these attacks can seize the main chain and partially or completely rewrite transaction records stored on the blockchain. To do this, we will explain blockchain, consensus protocol methods (POS, POW, ....

Study on Blockchain Infrastructure and Consensus Protocol Security.
GoalDespite the general argument for the adoption of blockchain technology in terms of security, privacy, and immutability, various attacks can occur on blockchain technology in reality. This article summarizes systematic details on Long-Range attacks for Proof-of-Stake protocols. If successful, these attacks can seize the main chain and partially or completely rewrite transaction records stored on the blockchain. To do this, we will explain blockchain, consensus protocol methods (POS, POW, ....

UniswapV2 mathematical approach and contract code review
✅ Follow me: X: @Younsle1 Warpcast: @zer0luckGoalI will learn about simple price rules, marginal price, and price impact through reviewing a whitepaper and exploring new features such as flashswap, MetaTX, and EIP712, while also studying the EVM non-integer and UQ112.122. I will familiarize myself with the protocol fee, sync, and skim functions, as well as the Uniswap Contract V2-core and v2-periphery, and delve into related mathematical theorems.UniswapV2 Simple Price RuleAMM-based CPMM (Con...

UniswapV2 mathematical approach and contract code review
✅ Follow me: X: @Younsle1 Warpcast: @zer0luckGoalI will learn about simple price rules, marginal price, and price impact through reviewing a whitepaper and exploring new features such as flashswap, MetaTX, and EIP712, while also studying the EVM non-integer and UQ112.122. I will familiarize myself with the protocol fee, sync, and skim functions, as well as the Uniswap Contract V2-core and v2-periphery, and delve into related mathematical theorems.UniswapV2 Simple Price RuleAMM-based CPMM (Con...

AMM and PMM Mechanisms and Mathematical Definitions to Avoid Dependency on LOB
GoalIn this section, we will study the basic economics and definitions of the Limit Order Book mechanism and identify its limitations. To resolve these limitations, we will analyze the AMM mechanism. We will examine the fluidity state changes dependent on external data and internal logic through mathematical definitions of the AMM mechanism. Additionally, we will also examine the relationship between the principle of invariants in swaps that occur in liquidity. I reviewed this paper. SoK: Dec...

AMM and PMM Mechanisms and Mathematical Definitions to Avoid Dependency on LOB
GoalIn this section, we will study the basic economics and definitions of the Limit Order Book mechanism and identify its limitations. To resolve these limitations, we will analyze the AMM mechanism. We will examine the fluidity state changes dependent on external data and internal logic through mathematical definitions of the AMM mechanism. Additionally, we will also examine the relationship between the principle of invariants in swaps that occur in liquidity. I reviewed this paper. SoK: Dec...