P2p Network Attacks

Blockchains often use network consensus mechanisms which require peer-to-peer (p2p) communications protocols to achieve consensus. Due to the decentralized nature of these protocols, new attack vectors appear and require examination during development and implementation.

Continue reading

Smart Contract Attacks

Smart contracts can remove some of the security concerns of a trusted, third party but then immediately introduce a completely new set of potential vulnerabilities.

Continue reading