Blockchain Security Archives | Shardeum | EVM based Sharded Layer 1 Blockchain https://shardeum.org/blog/category/blockchain-basics/blockchain-security/ Decentralization for everyone Wed, 22 May 2024 19:16:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://shardeum.nyc3.cdn.digitaloceanspaces.com/shardeum/2022/06/shardeum-favicon-150x150.jpg Blockchain Security Archives | Shardeum | EVM based Sharded Layer 1 Blockchain https://shardeum.org/blog/category/blockchain-basics/blockchain-security/ 32 32 The Future of Privacy in a Web3 World https://shardeum.org/blog/privacy-in-web3/ Thu, 21 Sep 2023 13:14:03 +0000 https://shardeum.org/blog/?p=14298 The impact of Web3 fundamentally empowers individuals, by securing privacy and ownership. Learn more about privacy in web 3 in this article

The post The Future of Privacy in a Web3 World appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
Privacy Protection in Blockchain https://shardeum.org/blog/privacy-protection/ Fri, 15 Sep 2023 12:45:20 +0000 https://shardeum.org/blog/?p=14154 Privacy protection keeps businesses, hackers, & other parties from accessing the information you wish to keep confidential. Learn about privacy protection in this article

The post Privacy Protection in Blockchain appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
What is a Web3 Bug Bounty? – Complete Guide https://shardeum.org/blog/bug-bounty/ Sat, 22 Jul 2023 20:36:25 +0000 https://shardeum.org/blog/?p=13099 Web3 bug bounty programs are vital resources for boosting security and trust in the Web3 landscape. In this article, learn more about bug bounty in detail.

The post What is a Web3 Bug Bounty? – Complete Guide appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
Sybil Attack https://shardeum.org/blog/sybil-attack/ Thu, 18 May 2023 07:42:03 +0000 https://shardeum.org/blog/?p=10934 Sybil Attack is a form of online security violation where an entity has numerous fake identities on a blockchain for malicious reasons. Learn about its types, impact, and threats.

The post Sybil Attack appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
51% Attack in Blockchain https://shardeum.org/blog/51-attack/ Wed, 10 May 2023 12:50:31 +0000 https://shardeum.org/blog/?p=10779 A 51% attack occurs when a violent user in a network takes control of a certain blockchain's mining resources. Learn more about 51% attack in this blog

The post 51% Attack in Blockchain appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
What is a Phishing Attack in Crypto, and How to Prevent it? https://shardeum.org/blog/what-is-phishing-and-how-to-prevent-it/ https://shardeum.org/blog/what-is-phishing-and-how-to-prevent-it/#respond Tue, 15 Nov 2022 13:40:38 +0000 https://shardeum.org/blog/?p=7203 Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. Know more about what is phishing and how to prevent it.

The post What is a Phishing Attack in Crypto, and How to Prevent it? appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
https://shardeum.org/blog/what-is-phishing-and-how-to-prevent-it/feed/ 0
The Frozen, Seized, and Forfeited Status of Cryptocurrencies https://shardeum.org/blog/cryptoasset-realization/ https://shardeum.org/blog/cryptoasset-realization/#respond Thu, 10 Nov 2022 06:44:04 +0000 https://shardeum.org/blog/?p=7144 Learn about the process of crypto asset realization, including how cryptocurrencies are frozen, seized, and forfeited due to legal actions, and the implications for owners and investors.

The post The Frozen, Seized, and Forfeited Status of Cryptocurrencies appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
https://shardeum.org/blog/cryptoasset-realization/feed/ 0
Blockchain Security – A Complete Guide https://shardeum.org/blog/what-is-blockchain-security/ https://shardeum.org/blog/what-is-blockchain-security/#respond Wed, 09 Nov 2022 13:55:07 +0000 https://shardeum.org/blog/?p=7137 Blockchain security is a risk management technique that aims to secure transactions, ensuring trust and immutability. Explore its types, and importance in safeguarding transactions and data.

The post Blockchain Security – A Complete Guide appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
https://shardeum.org/blog/what-is-blockchain-security/feed/ 0
How to Secure a Crypto Wallet? https://shardeum.org/blog/how-to-keep-crypto-safe/ https://shardeum.org/blog/how-to-keep-crypto-safe/#respond Tue, 08 Nov 2022 13:46:39 +0000 https://shardeum.org/blog/?p=7116 Hackers target cryptocurrency exchanges and wallets with advanced tools and methods. Here are our top 10 ways that can help you to keep your crypto safe

The post How to Secure a Crypto Wallet? appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
https://shardeum.org/blog/how-to-keep-crypto-safe/feed/ 0
What is a Flash Loan Attack? How to Restrain One? https://shardeum.org/blog/what-is-a-flash-loan-attack/ https://shardeum.org/blog/what-is-a-flash-loan-attack/#respond Mon, 31 Oct 2022 14:25:55 +0000 https://shardeum.org/blog/?p=6974 A Flash loan attack exploits DeFi protocol's smart contracts by borrowing large sums of funds with zero collateral. Read to learn what is a flash loan attack

The post What is a Flash Loan Attack? How to Restrain One? appeared first on Shardeum | EVM based Sharded Layer 1 Blockchain.

]]>
https://shardeum.org/blog/what-is-a-flash-loan-attack/feed/ 0