## DeSo / Bitclout Security Vulnerability

This post has also been published in ZenGo’s blog.
Introduction
In this post, I will describe a vulnerability and its exploitation in the Bitcoin to DeSo bridge within the Bitclout backend service that I’ve found.
If you don’t know what Bitclout is, we will get there shortly.
The vulnerability itself is based on a double-spending attack in t...

## Key Re-Sharing

Introduction
Multi-Party Computation (MPC) heaivly relies on the primitive of Shamir’s secret sharing (SSS) for various use cases.
In this secret-sharing scheme a set of $n$ parties would like to hold a secret in a distributed manner.
The secret, which will be denoted $s$ for the rest of this post, is an element of a field $\mathbb{Z}_p$.
It is...

## ZK-Hack Puzzle 3 Solution

In this post I’ll share my writeup to the third ZK-Hack puzzle!
The puzzle is available on ZK-Hack’s official website.
I’ve solved this puzzle with Elichai and Shalev.
I have written writeup to the first puzzle as well in this post, check it out!
This puzzle called “Double Trouble” gives us some introductory material about ZK-proofs and Schnorr...

## ZK-Hack first Puzzle Solution

In this post I’ll share my writeup to the first ZK-Hack puzzle!
This writeup has been awarded with the best writeup aware, granting my a nice reward :)
This official solution page is available on ZK-Hack’s official webpage and the puzzle link on github is available here.
I’ve solved this puzzle with Elichai and Shalev.
With that being said, let...

12 post articles, 2 pages.