"MUTE"

Search result of

Courses (0)

Articles (5)

Glossary (0)

DeBox: An Integrated Social Platform Based on DID
Beginner

DeBox: An Integrated Social Platform Based on DID

DeBox is a DID-based integrated social platform that combines on-chain and off-chain functionalities, aiming to create a "WeChat for Web3."
4/10/2024, 10:47:23 AM
 AScoin Wallet: Revolutionizing the Crypto Space with Unique Features and Enhanced Security
Beginner

AScoin Wallet: Revolutionizing the Crypto Space with Unique Features and Enhanced Security

This article introduces how the Web3 aggregation transaction multi-chain wallet AScoin Wallet breaks through the barriers for on-chain wallets to enter exchanges.
3/1/2024, 7:11:26 AM
Comprehensive Data Comparison: Who Will Be the Rising Star of the Layer 2 Race?
Advanced

Comprehensive Data Comparison: Who Will Be the Rising Star of the Layer 2 Race?

This article aims to help readers understand the landscape and characteristics of the Layer 2 competition through a comparison of on-chain data.
1/22/2024, 9:54:42 PM
Comprehensive comparison of on-chain data: Who is the future star of L2?
Beginner

Comprehensive comparison of on-chain data: Who is the future star of L2?

This paper compares a number of different L2 raceways in terms of several metrics.
1/6/2024, 9:00:59 AM
Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example
Beginner

Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example

On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, where over $1.5 billion in assets were stolen. This incident is similar to the attack on the Radiant Capital cross-chain lending protocol in October 2025, where attackers stole funds by controlling multi-signature private keys and exploiting contract vulnerabilities. Both incidents highlight the increasing complexity of hacker attacks and expose security vulnerabilities in the crypto industry. This article provides an in-depth analysis of the technical details of the Radiant incident, focusing on the abuse of malicious contracts and multi-signature wallets. The article concludes by emphasizing the urgent need to strengthen industry security measures to protect user assets.
2/22/2025, 4:21:23 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective