https://medium.com/dragonfly-research/we-live-in-a-mempool-backrunning-the-mev-crisis-a4ea0b493b05
https://cs.ucf.edu/~mohaisen/doc/icbc19a.pdf
https://github.com/openzeppelin/exploit-uniswap
https://github.com/tinchoabbate/function-clashing-poc
https://blog.openzeppelin.com/backdooring-gnosis-safe-multisig-wallets/
https://academy.binance.com/en/articles/sybil-attacks-explained
https://academy.binance.com/en/articles/what-is-a-dusting-attack
https://academy.binance.com/en/articles/what-is-an-eclipse-attack
An eclipse attack is an attack where interaction with a previously trusted resource becomes controlled by an attacker (ie. BGP reroute, block manip, etc...)
https://academy.binance.com/en/articles/byzantine-fault-tolerance-explained
https://academy.binance.com/en/articles/common-scams-on-mobile-devices
https://academy.binance.com/en/articles/threshold-signatures-explained
https://academy.binance.com/en/articles/a-beginners-guide-to-segretated-witness-segwit
https://academy.binance.com/en/articles/what-is-a-multisig-wallet
https://academy.binance.com/en/articles/zk-snarks-and-zk-starks-explained
https://academy.binance.com/en/articles/selfish-mining-explained
https://academy.binance.com/en/articles/what-do-schnorr-signatures-mean-for-bitcoin
https://academy.binance.com/en/articles/blockchain-scalability-sidechains-and-payment-channels
What is Tether (USDT) - https://academy.binance.com/en/articles/what-is-tether-usdt
What is Coin Burn? https://academy.binance.com/en/articles/what-is-a-coin-burn
What is a layer 2? https://academy.binance.com/en/glossary/layer-2
What is the lightning network? - https://academy.binance.com/en/articles/what-is-lightning-network
- Merkle Trees and Roots Explained
- Merkle tree is created by dividing data into many pieces, which are hashed repeatedly to form the merkle root.
- This allowas us to efficiently verify if something has gone wrong with a piece of data.
- When you start mining, you line up all the transactions you want ot include and construct a merkle tree.
- You put the resulting root hash (32 bytes) in the block header. This makes it so you only need to hash the block header rather than the entire block
- This works because it's tamper-proof. You effectiveyl summarize all of the block's transactions in a compact format
- Nodes running on devices with limited resources don't want to download and hash all of a block's transactions
- What they do is simply request a "Merkle proof" - evidence provided by the full node that proves that your transaction is in a particular block.
- This is referred to as SPV (Simplified Payment Verification) What is a light client?
- A light client is a node that doesn't hold a full copy of the block-chain