ขนาดวิดีโอ: 1280 X 720853 X 480640 X 360
แสดงแผงควบคุมโปรแกรมเล่น
เล่นอัตโนมัติ
เล่นใหม่
Very nice explanation, thanks! Maybe filtering the differences of code from audit to last deploy gave to the hacker ideas to exploit.
If there was a way for the auditor to submit the hash of the code they audited to etherscan then it could be displayed there. Although this would mean etherscan needing to verify the identity of the auditors.
great video, thanks for citing PeckShield's blog post
Great explanation as always, thanks Scott!
Thank you Scott for the great effort and useful analysis.
Props to samczsun. From his/her action I'd say s/he is an awesome person!
Awesome person does not steal other people's money
@@alterego157 nah he is the good hacker
Thanks for the explanation, Scott!
Excellent video, thank you Scott. I will definitely use some of this the next time I am researching a transaction.
Excellent look into this issue. Super enlightening; thanks!
Very clear review - thank you!
Thanks for the explanation, great job!
Can you provide a link ollr explanation regarding increasing the index by 1 to access password in the struct array
Thank you. What a wild story
Blew me away. Great analysis
Thanks for the detailed explanation :)
You should continue this serie
Awesome work!
Most importantly is also keeping funds in each users vaults using separate addresses. But noooo they wanted to keep all the funds in one vault!! 🤧
thanks your video are useful
Awesome stuff Scott thanks!
That's nice what a lesson
Awesome video!
Internal job
Amazing
Can u name the white hat hacker help me recover my funds from a hacker I have the person eth address
hit me up on twitter
@@epheph33 what is your twitter account?
@@dereklee2590 epheph
@@epheph33 Thanks man I been trying to find anyone that can help me:)
@@epheph33 Just message u on twitter a few minutes ago hopefully u check and can help me somewhat:)
😝😝😝😝😝😝😝😝😝....
Very nice explanation, thanks! Maybe filtering the differences of code from audit to last deploy gave to the hacker ideas to exploit.
If there was a way for the auditor to submit the hash of the code they audited to etherscan then it could be displayed there. Although this would mean etherscan needing to verify the identity of the auditors.
great video, thanks for citing PeckShield's blog post
Great explanation as always, thanks Scott!
Thank you Scott for the great effort and useful analysis.
Props to samczsun. From his/her action I'd say s/he is an awesome person!
Awesome person does not steal other people's money
@@alterego157 nah he is the good hacker
Thanks for the explanation, Scott!
Excellent video, thank you Scott. I will definitely use some of this the next time I am researching a transaction.
Excellent look into this issue. Super enlightening; thanks!
Very clear review - thank you!
Thanks for the explanation, great job!
Can you provide a link ollr explanation regarding increasing the index by 1 to access password in the struct array
Thank you. What a wild story
Blew me away. Great analysis
Thanks for the detailed explanation :)
You should continue this serie
Awesome work!
Most importantly is also keeping funds in each users vaults using separate addresses. But noooo they wanted to keep all the funds in one vault!! 🤧
thanks your video are useful
Awesome stuff Scott thanks!
That's nice what a lesson
Awesome video!
Internal job
Amazing
Can u name the white hat hacker help me recover my funds from a hacker I have the person eth address
hit me up on twitter
@@epheph33 what is your twitter account?
@@dereklee2590 epheph
@@epheph33 Thanks man I been trying to find anyone that can help me:)
@@epheph33 Just message u on twitter a few minutes ago hopefully u check and can help me somewhat:)
😝😝😝😝😝😝😝😝😝....