Crypto Custody - Becoming Your Own Bank
Minimize risk and take custody of your crypto rather than relying on a 3rd party.
Youtube Video
Playing the video that you've selected below in an iframe
Minimize risk and take custody of your crypto rather than relying on a 3rd party.
Learn smart contract security tips to defend against attacks like MEV, flash loan, and more.
Learn about the different types of liquidity pool and what it means to provide underwriting capital.
Learn about the difference between diversified and dedicated pools, rewards, and more.
Learn how an attacker exploited dForce Protocol owing to a read-only reentrancy vulnerability.
Learn how an attacker exploited LianGo Protocol by compromising the private key of LGT Pool owner.
Know the difference between borrowing & lending, and risks and rewards of providing liquidity.
Learn how an attacker exploited CoW Protocol owing to a flaw in the token authorization process.
BonqDAO and Orion Protocol compromise. Warner Music Group, OneFootball, and Sorare web3 initiatives.
Learn how an attacker exploited Orion Protocol as a result of insufficient reentrancy protection.
How was BonqDAO protocol hacked by an exploiter due to price manipulation, and oracle hack?
How was BEVO NFT project exploited by an attacker due to the deflationary nature of the tokens?
Azuki and Robinhood Twitter compromise. Oreo biscuits, and Pedigree web3 initiatives.