python零基础批量mint以太铭文
Python零基础批量mint以太铭文,小白也能快速上手运行属于自己的铭文脚本 从零开始教你如何构建一个属于自己的python环境并进行链上交互,本教程以windows为例1、搭建python运行环境python下载进入python官网中下载这个安装包然后安装https://www.python.org/downloads/windows/配置环境变量打开命令提示框(cmd) **,**在命令提示框(cmd)中输入 :path=%path%;C:\Python 其中需要注意的是:C:\Python 是上一步中选择python的安装目录,此处是默认安装目录安装IDE这里我推荐pycharm,pycharm对于python的支持是最到位的 建议初学者安装pycharm熟悉python后再使用别的解释器 PyCharm 下载地址 : https://www.jetbrains.com/pycharm/download/?section=windows 下载的话建议选择下面那个社区版本,社区版本的功能完全够用,上面的专业版本需要付费下载后默认安装就行以上教程节选自,感兴趣的朋友可以继续通...
Solidity Documentation Introduction
Solidity is an object-oriented, high-level language for implementing smart contracts. Smart contracts are programs which govern the behaviour of accounts within the Ethereum state. Solidity is a curly-bracket language designed to target the Ethereum Virtual Machine (EVM). It is influenced by C++, Python and JavaScript. You can find more details about which languages Solidity has been inspired by in the language influences section. Solidity is statically typed, supports inheritance, libraries ...
如果你想要改变人生,请认真阅读这份指南
不可否认的是,Crypto 的造富效应是其迅速蹿红的关键因素,但如果你的本金有限,真的也能够从中赚得足够可观的回报吗?如果你想要以小博大去获得「赚大钱」的机会,那么这份指南中提到的准则,应该会对你有帮助。 当我在 2017 年开始接触加密货币时,我满脑子就一个念头,就是我要变富。那时候我只是一家杂货店的普通员工,所以我的投资预算非常低,但我非常渴望拥有一个美好的未来。在这个过程中,我总结出了以下关键策略。 如果你是白手起家,这些应该是你要遵循的基本准则:(1)减少不必要的开支;(2)省钱;(3)提高收入,包括从事副业;(4)坚决贯彻决策曲线分析(DCA);(5)构建至少 5 年的长期规划。 当然,我知道你现在最想问的问题是什么,「如果我投资 BTC 或 ETH,怎么能赚大钱?」事实是你没戏。即使比特币涨到 10 万,现在投资 1000 美元也不会让你赚大钱。没错,你会体面地赚到几倍,但这没法改变你的人生。 不要误会我的意思,蓝筹很重要,因为他会在基本面和技术分析之外给我们提供一个更简单的降低投资组合风险的方法。但是,如果你想大幅增加自己的净资产,你就必须投资风险更高的山寨币。 关...
python零基础批量mint以太铭文
Python零基础批量mint以太铭文,小白也能快速上手运行属于自己的铭文脚本 从零开始教你如何构建一个属于自己的python环境并进行链上交互,本教程以windows为例1、搭建python运行环境python下载进入python官网中下载这个安装包然后安装https://www.python.org/downloads/windows/配置环境变量打开命令提示框(cmd) **,**在命令提示框(cmd)中输入 :path=%path%;C:\Python 其中需要注意的是:C:\Python 是上一步中选择python的安装目录,此处是默认安装目录安装IDE这里我推荐pycharm,pycharm对于python的支持是最到位的 建议初学者安装pycharm熟悉python后再使用别的解释器 PyCharm 下载地址 : https://www.jetbrains.com/pycharm/download/?section=windows 下载的话建议选择下面那个社区版本,社区版本的功能完全够用,上面的专业版本需要付费下载后默认安装就行以上教程节选自,感兴趣的朋友可以继续通...
Solidity Documentation Introduction
Solidity is an object-oriented, high-level language for implementing smart contracts. Smart contracts are programs which govern the behaviour of accounts within the Ethereum state. Solidity is a curly-bracket language designed to target the Ethereum Virtual Machine (EVM). It is influenced by C++, Python and JavaScript. You can find more details about which languages Solidity has been inspired by in the language influences section. Solidity is statically typed, supports inheritance, libraries ...
如果你想要改变人生,请认真阅读这份指南
不可否认的是,Crypto 的造富效应是其迅速蹿红的关键因素,但如果你的本金有限,真的也能够从中赚得足够可观的回报吗?如果你想要以小博大去获得「赚大钱」的机会,那么这份指南中提到的准则,应该会对你有帮助。 当我在 2017 年开始接触加密货币时,我满脑子就一个念头,就是我要变富。那时候我只是一家杂货店的普通员工,所以我的投资预算非常低,但我非常渴望拥有一个美好的未来。在这个过程中,我总结出了以下关键策略。 如果你是白手起家,这些应该是你要遵循的基本准则:(1)减少不必要的开支;(2)省钱;(3)提高收入,包括从事副业;(4)坚决贯彻决策曲线分析(DCA);(5)构建至少 5 年的长期规划。 当然,我知道你现在最想问的问题是什么,「如果我投资 BTC 或 ETH,怎么能赚大钱?」事实是你没戏。即使比特币涨到 10 万,现在投资 1000 美元也不会让你赚大钱。没错,你会体面地赚到几倍,但这没法改变你的人生。 不要误会我的意思,蓝筹很重要,因为他会在基本面和技术分析之外给我们提供一个更简单的降低投资组合风险的方法。但是,如果你想大幅增加自己的净资产,你就必须投资风险更高的山寨币。 关...

Subscribe to pikpika

Subscribe to pikpika
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers
In April, Primitive launched its first product, RMM-01, a decentralized finance (DeFi) protocol that allows users to earn trading fees from automated trading. When the protocol reached nearly 1000 cumulative users, we analyzed the accounts to determine their authenticity.
On the RMM-01 protocol, nearly 80% of users were identified as suspects in Sybil attacks. In response, Primitive developed a straightforward method for detecting and filtering these users. While Primitive uses this tool to remove noise that Sybil attacks impose on user data, other DeFi protocols can expand the open-source code to suit a large array of their own needs.
DeFi protocols commonly use airdrops as a method to launch tokens. This method rewards early users of the protocol by "airdropping," or giving, the users free tokens. Sybil attacks can be initiated to exploit airdrops in DeFi protocols.
The term "Sybil attack" originates from the main character in "Sybil" by Flora Rheta Schreiber. The book details a case study of a young girl who is thought to have Dissociative Identity Disorder. It was later revealed that the entire story was a ruse and Shirley Mason, the woman who inspired the character of Sybil, fabricated the different identities. In a Sybil attack, an entity generates a large quantity of pseudo-anonymous identities, akin to Sybil's multiple personalities in the book, to obtain a large influence over a network.
A common example of a Sybil attack is when a user, in anticipation of an airdrop, generates a large number of addresses, then deposits and removes tiny amounts of value from a DeFi protocol. This is referred to as "airdrop farming," and is often facilitated algorithmically. Protocol developers look down upon airdrop farming because their goal is to reward engaged and authentic users; not bots.
Upon launching the RMM-01 protocol, the Primitive team set up a monitoring infrastructure to notify us when users add and remove liquidity. As the Total Value Locked (TVL) grew, we noticed a large quantity of the notifications were for very small amounts of liquidity that were almost immediately removed after they were added. The large volume of small transactions indicated that Liquidity Providers (LPs) were Sybil-ing the protocol in anticipation of an airdrop.
The noise from the Sybil attacks made it difficult to analyze the authentic user activity on the RMM-01 protocol. We realized the need to filter accounts that orchestrated Sybil attacks so that we could gain a more accurate understanding of the value that users derived from the protocol. After the accounts associated with Sybil attacks were filtered out, our data better reflected the activity of our unique users.
The script that we built in response to Sybil attacks serves as a tool for more accurately quantifying authentic users. At Primitive, we use the information derived from this process to better inform data-driven decisions and improve the RMM-01 protocol experience for our users. The script is fairly agnostic, so it can benefit other DeFi protocols in the same ways that it does RMM-01, or it can be extended to fit a wide array of needs for protocol developers.
In response to Sybil attacks on the RMM-01 protocol, the Primitive team has identified a straightforward methodology for compiling lists of addresses associated with Sybil attacks. Once this list is generated, the associated addresses can be blacklisted and disregarded.
The methodology and the corresponding detection scripts are open-source and can be found here. This approach is ideal because anyone can use a small script on relevant contracts for their benefit. The script is configured by entering your ETHERSCAN_API key and CONTRACT_TO_LOOK_AT in a .env file.
The script queries a contract's transactions using the Etherscan API and compiles a list of addresses that interacted with the configured contract. Then, the script filters out transactions where no value was exchanged (such as token approvals). After this, the cost of the transaction is checked by multiplying the user's cumulativeGasUsed by gasPrice. If the cost of the transaction is greater than the value of the transaction, the script adds this address to an array of Sybil suspects.
There are many ways to make this script more robust. One approach is to query all transactions from the Sybil suspects and check if they are a collection of deposits with the same value. This is a clear indication that the Sybil suspect's address is farming airdrops.
Written by 0xJepsen
In April, Primitive launched its first product, RMM-01, a decentralized finance (DeFi) protocol that allows users to earn trading fees from automated trading. When the protocol reached nearly 1000 cumulative users, we analyzed the accounts to determine their authenticity.
On the RMM-01 protocol, nearly 80% of users were identified as suspects in Sybil attacks. In response, Primitive developed a straightforward method for detecting and filtering these users. While Primitive uses this tool to remove noise that Sybil attacks impose on user data, other DeFi protocols can expand the open-source code to suit a large array of their own needs.
DeFi protocols commonly use airdrops as a method to launch tokens. This method rewards early users of the protocol by "airdropping," or giving, the users free tokens. Sybil attacks can be initiated to exploit airdrops in DeFi protocols.
The term "Sybil attack" originates from the main character in "Sybil" by Flora Rheta Schreiber. The book details a case study of a young girl who is thought to have Dissociative Identity Disorder. It was later revealed that the entire story was a ruse and Shirley Mason, the woman who inspired the character of Sybil, fabricated the different identities. In a Sybil attack, an entity generates a large quantity of pseudo-anonymous identities, akin to Sybil's multiple personalities in the book, to obtain a large influence over a network.
A common example of a Sybil attack is when a user, in anticipation of an airdrop, generates a large number of addresses, then deposits and removes tiny amounts of value from a DeFi protocol. This is referred to as "airdrop farming," and is often facilitated algorithmically. Protocol developers look down upon airdrop farming because their goal is to reward engaged and authentic users; not bots.
Upon launching the RMM-01 protocol, the Primitive team set up a monitoring infrastructure to notify us when users add and remove liquidity. As the Total Value Locked (TVL) grew, we noticed a large quantity of the notifications were for very small amounts of liquidity that were almost immediately removed after they were added. The large volume of small transactions indicated that Liquidity Providers (LPs) were Sybil-ing the protocol in anticipation of an airdrop.
The noise from the Sybil attacks made it difficult to analyze the authentic user activity on the RMM-01 protocol. We realized the need to filter accounts that orchestrated Sybil attacks so that we could gain a more accurate understanding of the value that users derived from the protocol. After the accounts associated with Sybil attacks were filtered out, our data better reflected the activity of our unique users.
The script that we built in response to Sybil attacks serves as a tool for more accurately quantifying authentic users. At Primitive, we use the information derived from this process to better inform data-driven decisions and improve the RMM-01 protocol experience for our users. The script is fairly agnostic, so it can benefit other DeFi protocols in the same ways that it does RMM-01, or it can be extended to fit a wide array of needs for protocol developers.
In response to Sybil attacks on the RMM-01 protocol, the Primitive team has identified a straightforward methodology for compiling lists of addresses associated with Sybil attacks. Once this list is generated, the associated addresses can be blacklisted and disregarded.
The methodology and the corresponding detection scripts are open-source and can be found here. This approach is ideal because anyone can use a small script on relevant contracts for their benefit. The script is configured by entering your ETHERSCAN_API key and CONTRACT_TO_LOOK_AT in a .env file.
The script queries a contract's transactions using the Etherscan API and compiles a list of addresses that interacted with the configured contract. Then, the script filters out transactions where no value was exchanged (such as token approvals). After this, the cost of the transaction is checked by multiplying the user's cumulativeGasUsed by gasPrice. If the cost of the transaction is greater than the value of the transaction, the script adds this address to an array of Sybil suspects.
There are many ways to make this script more robust. One approach is to query all transactions from the Sybil suspects and check if they are a collection of deposits with the same value. This is a clear indication that the Sybil suspect's address is farming airdrops.
Written by 0xJepsen
No activity yet