Everyone, please be aware that phishing attack comments have been posted on this video. Please do not click on any links in comments. Don't send anyone Eth based on comments!
Further to the section on Front Running, I have created a post on Eth Research. Comments are appreciated: ethresear.ch/t/front-running-prevention-in-contracts-with-a-proof-submission-reward-model/13594
This i sort of related to the thoughts about what bugs the compile could introduce. With inline assembler, you can do some really "nasty" things, such as jumps to any location (which will then fail if there isn't a JUMPDEST)
@@EthereumEngineeringGroup Sorry I meant I dont think you can so JUMPs within assembly? For example I dont think you can call other internal functions within assembly?
@@AnonymousSkimaHarvey hmmmm that is going to be a challenge, but one I think I could pull off. I will have a go, and if I can get it to work, will make a video explainer.
I think you mean, is there any way to change the modifier to stop the re-entrancy issue. Assuming the function needs to be externally available, then I don't think so.
I think that the blocks are bigger and the cost of transactions is much higher. Given this, the cost of such an attack is much, much larger. Saying all of that, it the time window was too small, then an attacker could try to do a block stuffing attack.
My mind was blown at 1:31:10 I thought you were going to show us the classic honeypot with the internal transaction tricks, but it was far worse !!! (or better?) For sure somebody is going to use that code in malicious ways, new scams for sure.
Amazing talk, I used to get bored in classes but yours is amazing
Everyone, please be aware that phishing attack comments have been posted on this video. Please do not click on any links in comments. Don't send anyone Eth based on comments!
The real Top G
The master Peter Robinson!
Further to the section on Front Running, I have created a post on Eth Research. Comments are appreciated: ethresear.ch/t/front-running-prevention-in-contracts-with-a-proof-submission-reward-model/13594
Excelent content, as always!! 👏👏
Thanks
very informative talk
thank you!
Wow, excellent content !
Great content as always 🙏 however at 16:35 I am not sure about this statement ? For example I don’t see you do JUMPs ?
This i sort of related to the thoughts about what bugs the compile could introduce. With inline assembler, you can do some really "nasty" things, such as jumps to any location (which will then fail if there isn't a JUMPDEST)
@@EthereumEngineeringGroup Sorry I meant I dont think you can so JUMPs within assembly?
For example I dont think you can call other internal functions within assembly?
@@AnonymousSkimaHarvey hmmmm that is going to be a challenge, but one I think I could pull off. I will have a go, and if I can get it to work, will make a video explainer.
@@EthereumEngineeringGroup Thank you. Interested in getting your feedback if you cant :)
Thanks
45:11 hi, if any contract can call this contract with the funds. Is there any other way avoid this based on modifier? Thanks.
I think you mean, is there any way to change the modifier to stop the re-entrancy issue. Assuming the function needs to be externally available, then I don't think so.
1:09:55 do you think the method like that as Fomo3D is not able to be controlled any more?
I think that the blocks are bigger and the cost of transactions is much higher. Given this, the cost of such an attack is much, much larger. Saying all of that, it the time window was too small, then an attacker could try to do a block stuffing attack.
My mind was blown at 1:31:10
I thought you were going to show us the classic honeypot with the internal transaction tricks, but it was far worse !!! (or better?)
For sure somebody is going to use that code in malicious ways, new scams for sure.
Would you like to have sharing with some protocol code in practice? nice
Code is here: github.com/drinkcoffee/EthEngGroupSolidityExamples/tree/master/security/contracts
how can we be part of the zoom call? 😅
Join the meet-up: www.meetup.com/ethereum-engineering/
░p░r░o░m░o░s░m░ 💃