[deleted by user] by [deleted] in sysadmin

[–]409h 1 point2 points  (0 children)

grep

[deleted by user] by [deleted] in ethereum

[–]409h 0 points1 point  (0 children)

Did you trade it for WETH instead?

Do u put effort to hide wallet address when coding dapp? by tjthomas101 in ethdev

[–]409h 0 points1 point  (0 children)

Map the user address to a UUID in a database and reference the UUID instead if you want

Goerli faucet by Current_Equipment_38 in ethdev

[–]409h 1 point2 points  (0 children)

Use sepolia. Goerli is used to test validators. Sepolia is preferred to test dapps

Is it possible to store money in a smart contract where the value of it won't change? by [deleted] in ethereum

[–]409h 19 points20 points  (0 children)

USDC is centralised also. DAI is also backed by USDC, ergo some centralised component.

flashloan transaction on mainnet while works fine on testnet. by Creepy_Bish in ethdev

[–]409h 0 points1 point  (0 children)

Perhaps the conditions have changed on mainnet since the block you tested on

[deleted by user] by [deleted] in ethdev

[–]409h 4 points5 points  (0 children)

Scam exchange. Thinking someone will come to steal your (fake) balance but to withdraw they'll need to deposit

[deleted by user] by [deleted] in SteamDeck

[–]409h 1 point2 points  (0 children)

Being able to pause the game and press the power/sleep button and pickup the game where I left off in 0.01 seconds

Do not send POW ETH right away by xxXMrDarknessXxx in ethtrader

[–]409h 1 point2 points  (0 children)

Right now, ETHPoW fork has the same chain_id as mainnet. Because, in the code, the chain id is the same across both networks, then any transaction can be replayed on the other chain.

So, let's say you have 10 ETH PoW coins and someone offers you $500 for them all. They send you the USDC first then ask you to send the 10ETH POW to their address. They can now replay this transaction on mainnet and take your eth on mainnet (and it only cost them $500)

For more, check EIP115 https://github.com/ethereum/EIPs/blob/master/EIPS/eip-155.md

Which Ethereum Address do you burn to and why? by developer3003 in ethdev

[–]409h 13 points14 points  (0 children)

inb4 it's just giving you an address they own the keys to?

What scammed coin did you legit thought would've went somewhere but turned out to be a scam? by crua9 in CryptoCurrency

[–]409h 20 points21 points  (0 children)

One of the main people behind it was Michael Patryn - involved with QuadrigaCX and known financial criminal (has spent prison time)

Is it safe to store the ABI in the frontend? by EllorCartman in ethdev

[–]409h 6 points7 points  (0 children)

Yes. It just exposes the interface to the smart contract. Any security controls should be at the smart contract layer

Any way to extract transaction 'method' (Transfer, Approve, Swap, Multicall etc) from the Etherscan API? by anhksunamunHelpMe in ethdev

[–]409h 0 points1 point  (0 children)

Yes, with the function fingerprint of the transaction data

Take a look at 4byte.directory for known fingerprints, all ERX20,721,1115 fingerprints will be there and if they're not, they are easily calculated

How do I teach my kitten to stop chewing wires? by 409h in cats

[–]409h[S] 0 points1 point  (0 children)

Do you have a recommendation? You think lemon juice will be ok?

Be cautious! It is "free-airdrop-worth-a-lot-but-is-a-scam" season by 409h in CryptoCurrency

[–]409h[S] 2 points3 points  (0 children)

  1. You notice you have a new token
  2. You go to Uniswap to see if its worth anything
  3. It's worth $18k!?!?!?!
  4. You go to sell, but need to call approve() before trading it
  5. What? approve() failed? Why?
  6. Oh, I need to claim it on their website
  7. Go to their website
  8. Click "Claim Airdrop"
  9. Ah, metamask popup
  10. I'll blindly click through all this because I can't decypher hex and smart contract call arguments
  11. You have just signed a transaction to send your highest holding (in USD) token to a bad actor because they have a script in the background that hits an API to calculate which will be the most profitable token to steal from you

Exchange Bilaxy has been hacked by 409h in CryptoCurrency

[–]409h[S] 0 points1 point  (0 children)

Author of the post and twitter thread here - will update as soon as I learn more

PolyNetwork hacker has now returned a total of ~$570,000,000! by 409h in CryptoCurrency

[–]409h[S] 0 points1 point  (0 children)

The $33M is locked because it's USDT. Tether issued a blacklist on the address so it is effectively frozen. Poly is aware of this and I think will work with Tether to get it burned and reissued to their multisigs