Martin pfp

Martin

@frmartin

88 Following
11 Followers


Martin pfp
Martin
@frmartin
@frmartin Astra and OKX giveaway! ⚡️5000 winners ⚡️500,000 $PAY #airdrop rewards 📅Ends on 02 Feb 18:00 (UTC+8) Complete the quests here: https://okx.com/web3/giveaway/astracampaign My referal code for OKX: https://okx.com/join/46008741
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin You can earn Mining Points to gain $TAKER upon launch Referal link: https://earn.taker.xyz?start=ZKTM4
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "Exploring PSBT in Bitcoin DeFi Ecosystem" in Certik (https://skynet.certik.com/quest/exploring-psbt-in-bitcoin-defi-ecosystem?referralId=3218796460961843132) 1. What does PSBT standardize in Bitcoin transactions? - Creation, sharing, and signing of transactions 2. Which flag provides the highest transaction integrity in PSBT? - SIGHASH_ALL 3. PSBT can be finalized without all signatures. - False
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "Protect your cryptocurrency from dust attacks" in Certik (https://skynet.certik.com/quest/protect-your-cryptocurrency-from-dust-attacks?referralId=14567612136231416367) 1. How does a dusting attack compromise privacy? - By sending small crypto amounts to analyze wallet activity 2. What’s the purpose of the “dust” in a dusting attack? - To trace transactions and link addresses
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "Scam Pattern on Telegram Safeguard" in Certik (https://skynet.certik.com/quest/scam-pattern-on-telegram-safeguard?referralId=16077920019692592116) 1. What is the first step of this scam? - Scammers impersonate KOLs to lure users into joining groups 2. What are the warning signs during bot verification? - Prompt to share user credentials
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "CertiK Uncovers Vulnerability in Apple Vision Pro" in Certik (https://skynet.certik.com/quest/certik-uncovers-vulnerability-in-apple-vision-pro?referralId=1218875288286245096) 1. What was the name of the vulnerability discovered in the Apple Vision Pro? - GAZEploit 2. What accuracy did CertiK researchers achieve in reconstructing messages from eye-tracking data? - 92% 3. How many times has CertiK been publicly acknowledged by Apple? - Six times
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "Understanding SkyNode: Blockchain’s Secure Foundation" in Certik (https://skynet.certik.com/quest/understanding-skynode-blockchains-secure-foundation?referralId=9209788436779914176) 1. What is a key feature of CertiK SkyNode? - It secures and optimizes blockchain nodes. 2. What is one benefit of SkyNode’s performance dashboard? - Tracks staking rewards and validator metrics. 3. SkyNode reduces the latency of historical data retrieval by 95%. - True
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Go to mining points from Lite mining node (taker)! https://earn.taker.xyz?start=ZKTM4
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "SpunkySDX | Revolutionizing Commerce with Blockchain and AI" in Certik (https://skynet.certik.com/quest/spunkysdx-revolutionizing-commerce-with-blockchain-and-ai?referralId=3160947288234932427) 1. What does SpunkySDX use to monitor stolen assets? - AI algorithms 2. What is the APY available for staking SSDX tokens? - 5% 3. In addition an audit, what other transparency measures has SpunkySDX taken? - KYC Badge
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "CertiK Hack3d 2024 Part 3 - Building a Resilient Web3 Ecosystem" in Certik (https://skynet.certik.com/quest/certik-hack3d-2024-part-3-building-a-resilient-web3-ecosystem?referralId=8057503561052600888) 1. What is the primary purpose of CertiK’s Wallet Scan tool? - Detect high-risk wallet authorizations 2. Which defensive measure helps protect against phishing? - Verifying URLs before interacting
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "CertiK Hack3d 2024 Part 2 - Uncovering Major Incidents" in Certik (https://skynet.certik.com/quest/certik-hack3d-2024-part-2-uncovering-major-incidents?referralId=10038867032223654424) 1. What tactic was used in the DMM Bitcoin exploit? - Address poisoning 2. Which high-profile incident involved stolen funds returned to the victim? - $129 Million Address Poisoning Case 3. How much was stolen in the largest social engineering attack of 2024? - $243 million
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "CertiK Hack3d 2024 Part 1 - Web3 Security by the Numbers" in Certik (https://skynet.certik.com/quest/certik-hack3d-2024-part-1-web3-security-by-the-numbers?referralId=3961749978908199657) 1. Approximately how much was lost in Web3 hacks, scams, and exploits in 2024? - $2.3 billion 2. What was the most costly attack vector in 2024? - Phishing 3. Which blockchain experienced the most security incidents in 2024? - Ethereum
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "Massa | The First Decentralized Cloud Network" in Certik (https://skynet.certik.com/quest/massa-the-first-decentralized-cloud-network?referralId=16176500089014128581) 1 What is the primary benefit of Massa's parallel block architecture? - It enables simultaneous block production across multiple threads for unmatched scalability 2. How do Autonomous Smart Contracts (ASCs) on Massa differ from traditional smart contracts? - They operate independently based on predefined conditions 3. What does the Massa Bridge enable? - The transfer of ERC-20 tokens like USDC, DAI, and WETH between Ethereum and Massa
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Mantle Yield Lab Rewards are now live on @layer3xyz! Participants can claim their rewards from January 16th until March 15th: https://app.layer3.xyz/quests/mantle-yield-lab-claim-your-rewards Rewards for ALL Yield Lab stages and segments can be claimed by eligible users via Layer3. This includes lottery rewards as well as project participation rewards in the event. A list of all 464 lottery winners can be found here: https://mantle.to/yieldlablottery
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
Answers for the Quest "CryptoBottle Incident Analysis" in Certik (https://skynet.certik.com/quest/cryptobottle-incident-analysis?referralId=4054947040448788180) 1. What was the total loss resulting from the CryptoBottle incidents in October 2024? ~$527,000 2. What vulnerability in the swap() method allowed the October 24 exploit to succeed? - Disabled balance check 3. What function did the attacker use to acquire large amounts of NAS tokens with minimal USDT? - Invest()
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
Answers for the Quest "Identifying Crypto Market Manipulation" in Certik (https://skynet.certik.com/quest/identifying-crypto-market-manipulation?referralId=4755512955233989882) 1. What is the purpose of wash trading? - To create fake trading activity 2. What happens in a pump-and-dump scheme? - Tokens are artificially inflated and then sold off
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
Answers for the Quest "Defending Against Clipper Malware" in Certik (https://skynet.certik.com/quest/defending-against-clipper-malware?referralId=13393137162205591226) 1. What does clipper malware do? - Replaces copied crypto wallet addresses with hacker-controlled addresses 2. Which apps are targeted by repackaged versions of malware? - Messaging apps like WhatsApp and Telegram 3. What is one way to protect yourself from clipper malware? - Verify wallet addresses before sending funds
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "How to Ace the CertiK KYC Badge" in Certik (https://skynet.certik.com/quest/how-to-ace-the-certik-kyc-badge?referralId=16122343097320145506) 1. What does the CertiK KYC Badge signify? - The project team is transparent and verified. 2. What behavior should you avoid during the KYC process? - Using fake IDs or hiding key team members. 3. Why is the CertiK KYC Badge beneficial? - It builds trust and enhances transparency.
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
@frmartin Answers for the Quest "Clipper DEX Withdrawal Vulnerability Exploit" in Certik (https://skynet.certik.com/quest/clipper-dex-withdrawal-vulnerability-exploit?referralId=11293943558299402050) 1. What was the root cause of the Clipper DEX exploit? - Vulnerability in the withdrawal function 2. What action did Clipper take to prevent further exploitation? - Paused swaps and deposits, requiring mixed-asset withdrawals 3. The Clipper exploit affected all liquidity pools on the platform. - False
0 reply
0 recast
0 reaction

Martin pfp
Martin
@frmartin
Answers for the Quest "Kendu Inu | Organic Meme Community" in Certik (https://skynet.certik.com/quest/kendu-inu-organic-meme-community?referralId=13943603132043181044) 1. What is the primary approach Kendu Inu uses to grow its ecosystem? - Organic community-driven engagement 2. What does the 2024 CertiK audit of Kendu Inu reveal? - Two major findings related to centralization were resolved
0 reply
0 recast
0 reaction