home.social

#smartcontracts — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #smartcontracts, aggregated by home.social.

  1. Arboreteum (ARM)
    The Eco-Friendly Growth-Driven Token
    Arboreteum (ARM) is a next-generation ERC-20 token designed to fund and incentivize real-world tree planting through an innovative, self-regulating economic model.

    #CryptoLaunch #ScalingSolutions #SmartContracts #OnChain #Arbitrum #ArbitrumOne #ARB #ArbitrumEcosystem #Crypto #Cryptocurrency #DeFi #DeFiCommunity

  2. Web 3.0 is redefining the internet.
    From decentralization and blockchain to digital ownership and data sovereignty, the future is trustless, transparent, and user-controlled.

    At Nirvista, we’re building the foundation for a smarter, more secure digital economy powered by Web3 innovation.

    🚀 Own your data.
    🔐 Protect your privacy.
    🌐 Experience true interoperability.

    #Nirvista #Web3 #Web3Technology #BlockchainInnovation #Decentralization #DigitalOwnership #SmartContracts#FutureOfInternet

  3. #Blockchain ist kein Thema für #Java-Devs? Falsch! Julius Lauterbach zeigt dir ein Setup mit Wallet, #Web3j & #SmartContracts – inklusive Beispielprojekt.

    Einfach nachbauen & ausprobieren – direkt in deiner IDE: javapro.io/de/die-blockchain-i

    @web3labs @ASFMavenProject #JAVAPRO

  4. Vitalik e a solução do Trilema na Layer 1

    Quer entender como o Vitalik tenta resolver o Trilema no Ethereum? 🤔

    - O foco: resolver o Trilema diretamente na Layer 1 do Ethereum ⚖️
    - Estratégia: tornar a armazenagem de dados mais barata e segura 💾🔒
    - Impacto: permitir que smart contracts operem de forma eficaz e atacar a questão da escalabilidade ⚙️📈
    - Técnica mencionada: uso de zero-knowledge proofs como...

    #ethereum #blockchain #vitalik #zkp #smartcontracts #escalabilidade #MorningCrypto

  5. Vitalik e a solução do Trilema na Layer 1

    Quer entender como o Vitalik tenta resolver o Trilema no Ethereum? 🤔

    - O foco: resolver o Trilema diretamente na Layer 1 do Ethereum ⚖️
    - Estratégia: tornar a armazenagem de dados mais barata e segura 💾🔒
    - Impacto: permitir que smart contracts operem de forma eficaz e atacar a questão da escalabilidade ⚙️📈
    - Técnica mencionada: uso de zero-knowledge proofs como...

    #ethereum #blockchain #vitalik #zkp #smartcontracts #escalabilidade #MorningCrypto

  6. Blockchain is often seen as complicated, but at its core, it’s simple — a blend of math, code, and human trust. It’s a transparent system where data can’t be altered and every transaction is verified by logic, not authority.
    Let’s decode how this foundation of trust is reshaping industries worldwide.

    #Nirvista#BlockchainSimplified #CryptoEducation #Web3 #Decentralization #TrustlessSystems #DigitalInnovation #FutureOfFinance #BlockchainTechnology #SmartContracts #InfiniteDigitalPossibilities

  7. The potential power of agents can't really be overstated. Systems that in aggregate can change the way we work at basically every level.

    People are worried about AI for damn good reasons. AI companies power their business through our private information. But it doesn't have to be that way. Fossil fuel companies do awful things to the earth, but that doesn't make electricity bad. AI companies are evil, but AI isn't bad on its own.

    If we want good AI that means good privacy, and good security. It means that a program that is there to record my voice and transcribe it doesn't need to have access to my personal photos. We need models of computing that are designed around consent, and build for small, singular tasks that compose.

    That's why the capabilities model is so necessary and we see so much work from different people and projects going into it.

    With Smart Contracts, it's necessary. With AI agents, we need it yesterday.

    2/2

    #Programming #AI #OCAP #Capabilities #Agents #SmartContracts

  8. The main idea around object capabilities, decades before cryptocurrencies and all that, was around the idea of so-called "smart contracts", which really boils down to "Code that does financial and legal things on our behalf", and the core takeaway from that was that if you don't have a serious computer security model, there's no real way to do this right.

    When I say serious computer security model, for non-tech folks, I don't mean "Install the latest virus scanner.", I mean you need complete assurance that a program that's meant to do one thing can't do something else- not "should not" or "won't try", I mean "can't", as in even if the person who wrote this program is pure evil, the thing they want to do won't happen.

    And the best way we know how to do that is the object capabilities model. It's not the only way, but we've learned in the last ~35 years that it's the only practical way.

    Now let's talk about AI and LLMs...

    1/

    #Programming #AI #OCAP #Capabilities #Agents #SmartContracts

  9. The Fusaka Upgrade Is Capping Ethereum’s Biggest Transactions: Here’s Why - TLDR:

    Fusaka activates EIP-7825, capping each Ethereum transaction at 16.78M gas.
    Develo... - blockonomi.com/the-fusaka-upgr #smartcontracts #blockchain #cryptonews #ethereum #eip-7825 #ethprice #gaslimit #fintech #crypto #fusaka

  10. Today I learned that apparently #Ethereum #SmartContracts (where you use #crypto as a sort of virtual notary/middleman) can get lost in the blockchain, effectively preventing them from being paid or enforced, because the infrastructure is so decentralized it's not reliable. Like, it sounds like the equivalent of putting your #SmartContract on a Fedi server and coming back a year later to find it shut down or something.

    I swear, whenever #cryptocurrency seems to be doing something useful or technically interesting, I will randomly come across someone saying that it has some problem that sounds fucking stupid.

    Like, the other problem that Ethereum has is that people can literally just steal it from you by embedding program that hacks your wallet into a token, and anyone involved in enforcement of that will be like, "they stole it from you fair and square". And this kind of defeats the central purpose of the interesting cryptocurrency, to be #currency.

  11. Why Smart Contract Development Is the Key to Future-Proofing Digital Agreements

    Traditional contracts are becoming a thing of the past. In an era driven by automation and decentralization, smart contracts are emerging as the backbone of secure and efficient digital transactions.

    From finance to supply chains, they’re streamlining operations and building trust like never before.

    🔗malgotechnologies.com/smart-co

    #SmartContracts #BlockchainDevelopment #DigitalAgreements #FutureOfBusiness

  12. Trac Systems is promoting "Tap Protocol" (Tokenized Asset Protocol) to power a DeFi toolkit on BlockChain layer 1. Tap Protocol is a tokenized asset issuance and management platform built on Bitcoin, making use of the Ordinals system.

    It enables users and developers to create, manage, leverage smart contracts, and trade digital assets and tokens directly on the Bitcoin blockchain. cointelegraph.com/news/smart-c #Crypto #CryptoCurrencies #BlockChain #TAPProtocol #Tokenization #SmartContracts #DigitalAssets #DeFi #DigitalTokens #BitCoin

  13. Смарт-контрактов ещё нет, а адреса уже есть: зачем нужен CREATE2 (EIP-1014)

    В этой статье я разбираю, как работает CREATE2, чем он отличается от CREATE, зачем нужен в контексте state channels и ERC-4337, и как его можно использовать — от вычисления адресов в Uniswap V2 до взлома Tornado Cash на $1M. Показываю примеры на Solidity и Assembly, а ещё — как на одном и том же адресе можно развернуть два разных смарт-контракта. Да, и такое возможно.

    habr.com/ru/articles/928464/

    #CREATE #CREATE2 #EVM #OPCODE #Ethereum #statechannels #uniswap #erc4337 #eip1014 #smartcontracts

  14. Interesting name for a blockchain focused on managing privacy.

    Brought to you from the creators of Cardano, the Midnight network supports the notion that privacy shouldn’t be absolute or all-or-nothing—it should be contextual. In theory, users can control and protect sensitive information by default, while enabling the right level of transparency when it’s required. We will see if it survives. coindesk.com/business/2025/06/
    DL the Midnight tokenomics whitepaper here: 45047878.fs1.hubspotuserconten #Crypto #CryptoSecurity #Security #BlockChain #NightToken #GlacierDrop #MidnightNetwork #Tokenomics #SmartContracts

  15. Today's situation at the YieldBlox v2 lending pool (blend.capital, Stellar network) lasted about 5 hours.

    Supplying USDC had an APY of over 100%.

    #XLM #BlendCapital #StellarXLM #SmartContracts #YieldBlox

  16. **Derivation of paths** (path derivation) is a method by which derived keys are created from one master key (for example, in cryptography or blockchain technologies). In simple words, it is like a tree, where each branch grows from the main trunk, and the process of growing itself is a derivation.

    bastyon.com/kolibristudio?s=e8

    **How it works:**
    **root (primary key)**:
    You have one master secret key (eg seed phrase or master key).

    **Formula for branching**:
    A mathematical formula or algorithm (such as HMAC or hashing) is used to generate new keys based on the master key.

    **The structure is tree-like**:
    Each new key can "branch" into even more keys. The result is a hierarchy where each key can be unique, but they are all related to a primary key.

    **Control and security**:

    The master key allows you to restore all derived keys.
    If someone only gets access to the derived key, they won't be able to get to the master.

    **A simple example in life:**
    Imagine you have a phone number (master key) and you use it to register on several sites. Each site gets its own unique number (derived key) that is linked to your primary number but not disclosed.

    **Where it is used:**
    **Cryptocurrencies**:
    Wallets like Bitcoin or Ethereum use "hierarchical deterministic derivation" (HD wallets). This allows multiple transaction addresses to be created from a single master key.

    **Passwords**:
    Password managers can generate unique passwords for each site based on a single master.

    **Security**:
    Path derivation is often used to generate unique encryption keys in secure systems.

    **The main idea:**
    Instead of storing many separate keys or passwords, you have one master secret and everything else is generated automatically when needed. It's convenient, safe and effective!

    Using crypto wallets from different vendors, sites, and apps requires attention to detail to ensure the security of your assets and privacy. Here's what to consider:

    **1. Choosing the type of wallet**
    **Hardware wallets**: The most secure option for storing large sums, for example, Ledger, Trezor.
    **Software wallets**: Installed on a PC or smartphone (eg Exodus, Trust Wallet).
    **Online wallets (web wallets)**: Used through a web browser, but are more vulnerable to attack.
    **Paper wallets**: The private key is printed or written down on paper.
    **Browser wallets**: For example, MetaMask, which work as plugins.
    👉 *Choose a wallet depending on your needs: frequency of use, amount of assets and level of security.*

    **2. Reputation of the manufacturer**
    Check reviews and ratings.
    Use only open-source wallets to ensure transparency.
    Avoid unknown or new apps without a proven track record.

    **3. Security**
    **Saving the seed phrase**: Write it down on paper and never save it electronically (notes, photos, etc.).
    **Password**: Use a strong password to access the wallet.
    **Two-factor authentication (2FA)**: Enable if available.
    **Renewal**: Update your app or wallet firmware regularly to fix vulnerabilities.
    **Encryption**: Make sure your wallet encrypts data.

    **4. Compatibility**
    Make sure the wallet supports the blockchains and cryptocurrencies you want (for example, not all wallets support NFT or DeFi).
    Check out the integration with popular decentralized platforms (eg Uniswap, OpenSea).

    **5. Backup**
    Back up the seed phrase and private keys.
    Keep copies in a safe place (such as a safe).
    Never entrust your keys to a third party, even if it's a support service.

    **6. Confidentiality**
    **VPN**: Use a VPN to access your wallet, especially on public networks.
    **Anonymity**: Choose wallets that do not collect personal data.
    **Beware of phishing**: Always check the website or app address.

    **7. Costs and commissions**
    Check transaction fees.
    Some wallets automatically set high fees to speed up transactions - check this manually.

    **8. Technical support**
    Research whether the wallet has a reliable support service.
    Avoid apps that don't have a clear way of communicating to solve problems.

    **9. Verification of counterfeits**
    Download applications only from official sites or stores (Google Play, App Store).
    Check that the hardware wallet is properly packaged and has no signs of opening.

    **10. Work on decentralized platforms**
    Always use keys only in trusted decentralized applications.
    Avoid connecting your wallet to sites with a dubious reputation.

    **Recommendation in practice**
    Keep the main part of funds in a hardware wallet.
    Use software or browser wallets for daily transactions.
    Keep your security knowledge up to date as fraud techniques evolve.

    The security of cryptocurrency assets depends only on you, so be careful and careful!
    **The importance of testing software on your own PC or device and third-party services**
    Testing software, sites and extensions before use is a critical step for security **security**, **stability** and **convenience of work**. It helps to avoid risks that could lead to the loss of data, finances or confidential information.

    **1. Data security**
    **Detection of malicious software**: Some software or extensions may contain viruses, trojans or backdoors that open access to your system to attackers.
    **Avoiding phishing**: Third-party services can copy famous brands to steal your passwords, keys, or other sensitive information.
    **Recommendations:**
    Use antivirus programs and utilities to analyze malicious code.
    Download programs only from official sources.

    **2. Compatibility**
    Some software may conflict with pre-installed programs or your operating system.
    Improper operation can lead to crashes, "blue screen" or freezes.
    **Recommendations:**
    Test new software in a secure environment (for example, in a virtual machine or an isolated session).
    Check the software system requirements before installing.

    **3. Functionality check**
    Not all programs or extensions work as promised by the manufacturer.
    Incorrect work can lead to loss of important data or failure to perform necessary tasks.
    **Recommendations:**
    Test key features in test mode.
    Read user reviews to learn about possible problems.

    **4. Confidentiality**
    Some apps may collect your data without your knowledge.
    This is especially dangerous for crypto wallets, where even a minimal vulnerability can lead to asset theft.
    **Recommendations:**
    Analyze what permissions the software requires (for example, access to the camera, microphone or contacts).
    Use network activity monitoring to detect suspicious connections.

    **5. Reliability of third-party services (sites, API)**
    Accessing an untrusted service can end up with your credentials being stolen or your system infected.
    Sites with a dubious reputation often become a source of attacks, such as mining scripts or resource theft.
    **Recommendations:**
    Use it **VPN** to protect your IP address from being tracked.
    Transfer confidential data only through services with HTTPS.

    **6. Saving resources and time**
    Inappropriate software or plugins can use too many system resources, which slows down your device.
    This also applies to third-party services that may create "extra" requests or cause disruptions in your network.
    **Recommendations:**
    Measure resource consumption during testing (CPU, RAM, Internet).
    Avoid installing a lot of untested software.

    **7. Ease of recovery in case of failure**
    New software may corrupt your settings or important data.
    Third-party services may change the format of your files or their structure.
    **Recommendations:**
    Make backup copies before installing or using new software.
    Create system restore checkpoints.

    **Practical tips for testing**
    **Testing environment:
    ** Use a separate device, virtual machine or sandbox to test new software.

    **Monitoring:

    **
    Analyze application network activity through tools such as Wireshark or GlassWire.
    Install a program that monitors changes in the registry or system files.
    **Browser extensions:

    **
    Install extensions only from official stores (Chrome Web Store, Mozilla Add-ons).
    Check the extension regularly for updates and changes to the privacy policy.
    **Regular checks:
    ** Use utilities such as Malwarebytes, Norton or Kaspersky to check the system for vulnerabilities.

    Testing all software and services allows you to avoid most problems and ensures maximum efficiency of your equipment.

    This is a really important point: not all tools, even those considered "core" (Core tools, nodes or built-in wallets), have the functionality you can expect by default. Here is what should be understood and taken into account:

    **1. Limitation of the Core toolkit**
    **Not all features are available out of the box**: For example, Bitcoin Core allows full synchronization with the network, but does not have a convenient interface for integration with other services.
    **Specific needs**: Core nodes can be focused on narrow tasks (for example, block verification only), without additional features such as multi-signature support or DeFi.
    **Example**:
    An Ethereum Geth node may not support functionality that modern dApps require (for example, optimized requests to the blockchain via RPC).

    **2. Wallets with built-in functionality, but with limitations**
    **Limited access to assets**: For example, some wallets only support standard tokens (ERC-20, BEP-20) but cannot work with NFT or L2 solutions.
    **Incomplete integration**: Wallets built into nodes may not have a user-friendly GUI or backup capabilities.
    **Example**:
    The Bitcoin Core wallet supports only basic transactions and does not provide convenient means for managing complex functions such as multi-signatures or managing multiple addresses.

    **3. Lack of automation and convenience**
    **Manual setting**: Core tools often require manual configuration (eg configuration file, startup options).
    **Basic UX/UI**: GUIs are usually not a priority for developers of Core solutions, which makes them difficult to use for average users.

    **4. Lack of integration with other tools**
    Most Core solutions do not have built-in tools for integration with dApps, analytics services or APIs for third-party applications.
    Some wallets or nodes do not support modern standards (such as SegWit or Taproot for Bitcoin).

    **5. High requirements for resources**
    **Data size**: A full node can require hundreds of gigabytes of disk space (like Bitcoin Core or Ethereum).
    **System resources**: Node operation may be too heavy for devices with limited power.

    **How to choose the optimal tool?**
    **Functional research:

    **
    Study the documentation and the tool's capabilities before using it.
    Understand what features you really need (like L2, token or DeFi support).
    **Expansion of possibilities:

    **
    Use additional tools on top of Core solutions (e.g. Lightning Network for Bitcoin, Infura for Ethereum).
    Integrate third-party wallets or services to expand functionality.
    **Automation:

    **
    Add scripts or automation to simplify routine tasks.
    **Compatibility check:

    **
    Make sure the tool supports your tasks (tokens, addresses, standards).
    Update your nodes or wallets regularly to get new features and bug fixes.

    **Recommendations for users**
    If you only need basic features, use proven wallets with easy access (eg Exodus, Trust Wallet).
    For professional blockchain work, choose Core nodes, but be prepared for a more complex setup.
    For a hybrid approach (partial control and API integration), use services like Alchemy or Infura.
    Core tools provide fundamental capabilities, but require additional work to meet modern user needs.

    Here is a link to support the project for donors and philanthropists:
    🌍** Support the project:**
    Kolibri Studio Donate Page
    📥** Contact for philanthropists:**
    Telegram of the editorial team
    Matrix: Future-Tech Community
    Your contributions help develop the project, support its initiatives and create new solutions for the community. Thank you for your support! 🌟

    **List of literature and resources for independent study**
    **Books:

    **
    "Blockchain Basics: A Non-Technical Introduction in 25 Steps" by Daniel Dressler
    "Mastering Bitcoin" - Andreas M. Antonopoulos
    "Mastering Ethereum" - Andreas M. Antonopoulos, Gavin Wood
    "The Internet of Money" - Andreas M. Antonopoulos
    **Scientific articles and materials:

    **
    Nakamoto S. (2008).*Bitcoin: A Peer-to-Peer Electronic Cash System*.
    Wood G. (2014). *Ethereum: A Secure Decentralised Generalised Transaction Ledger*.
    Vitalik Buterin (2021). *Ethereum Whitepaper*.
    **Online resources:

    **
    Bitcoin.org — The official Bitcoin resource
    Ethereum.org — Ethereum documentation
    CoinMarketCap — Analytics of cryptocurrencies
    Binance Academy — Educational materials
    **Forums and communities:

    **
    Bitcointalk — Forum about cryptocurrencies
    Reddit (r/cryptocurrency) — Discussions about the crypto world
    Ethereum StackExchange — Answers to technical questions
    **Tools and services:

    **
    Etherscan — Ethereum Blockchain Scanner
    Blockchain.com Explorer — Scanner for Bitcoin and other blockchains
    MyCrypto — Wallet for Ethereum
    Fat — Infrastructure for working with blockchains

    **Hashtags for promotion in social networks**
    #Blockchain #Cryptocurrency #Bitcoin #Ethereum #Decentralisation #CryptoEducation #BigData #Web3 #OpenSource #CryptoMining #FutureTech #FinTech #CryptoSecurity #SmartContracts #DigitalTransformation
    This list will help you navigate the topic of blockchains, cryptocurrencies and decentralized technologies.

    kolibristudiopro.blogspot.com/

    Donate Page List Wallet Address
    kolibristudiopro.blogspot.com/

    Illustration: Біткоїн Ренесанс: Як Layer 2 Біткоїна Можуть Відродити Біткоїн - Bitcoin News
    news.bitcoin.com/uk/bitkoin-re

  17. Изучаем Ethereum через практику: моя история деплоя смарт-контракта в Sepolia

    Изучаем Ethereum через практику: моя история развертывания смарт-контрактов Сегодня я с удовольствием поделюсь своим уникальным опытом, полученным при развертывании смарт-контрактов двумя разными методами в тестовой сети Sepolia.

    habr.com/ru/articles/871168/

    #смартконтракт #смартконтракты #блокчейн #solidity #ethereum #blockchain #smartcontracts #smartcontract