We recommend the following resources.
Quantifying the Risk of Unlimited Approval of ERC20 Tokens
Exploiting the Profanity Flaw
Sheridan on User Security Habits
Google’s Quantum Supremacy
IBM Quantum System One
Shor’s algorithm
Grover’s Algorithm
NIST Post-Quantum Cryptography Standardization
2022 Quantum Threat Timeline Report
The Quantum Resistant Ledger
Review of Cross-Chain Bridge Hacks
Certik HACK3D Report
AWS Digital Sovereignty Pledge
AWS Nitro Enclaves
Ethereum Account Abstraction Proposal
Ethereum Roll Back Debate & the 2016 Hardfork
Last updated 1 year ago