We recommend the following resources.
Quantifying the Risk of Unlimited Approval of ERC20 Tokensarrow-up-right
Exploiting the Profanity Flawarrow-up-right
Sheridan on User Security Habitsarrow-up-right
Google’s Quantum Supremacyarrow-up-right
IBM Quantum System Onearrow-up-right
Shor’s algorithmarrow-up-right
Grover’s Algorithmarrow-up-right
NIST Post-Quantum Cryptography Standardizationarrow-up-right
2022 Quantum Threat Timeline Reportarrow-up-right
The Quantum Resistant Ledgerarrow-up-right
Review of Cross-Chain Bridge Hacksarrow-up-right
Certik HACK3D Reportarrow-up-right
AWS Digital Sovereignty Pledgearrow-up-right
AWS Nitro Enclavesarrow-up-right
Ethereum Account Abstraction Proposalarrow-up-right
Ethereum Roll Back Debate & the 2016 Hardforkarrow-up-right
Last updated 2 years ago