Published inCoinmonksProduction Contract Security — Part 3In our previous articles, we delved into the world of multi-sig wallets and best practices surrounding them. Take a look at Part 1 and…Jul 26, 2022Jul 26, 2022
Published inCoinmonksProduction Contract Security — Part 2Now that you have the basic idea of what a multisig is and how it can help you, let’s actually set one up. I’m going to walk you through…May 14, 2022May 14, 2022
Published inCoinmonksProduction Contract Security — Part 1Congratulations! You just deployed your first smart contract to the mainnet and your platform launch is imminent. As you unlace your Air…May 11, 2022May 11, 2022
Published inOrigin ProtocolA Minimal Proxy in the WildThe recent network load on Ethereum has caused teams both large and small to rethink and optimize their solidity and contract deployment…Jun 11, 2021Jun 11, 2021
Published inOrigin ProtocolThree-time Grammy Winner Ryan Tedder to Debut NFTs on OriginOrigin is excited to announce the upcoming release of an exclusive NFT collection from the Grammy award-winning songwriter, producer, and…Apr 14, 20211Apr 14, 20211
Congratulations, it’s a lambdaYour first AWS Lambda function exposed via an API Gateway REST interfaceMar 11, 2019Mar 11, 2019
Published inGoogle Cloud - CommunityManaging Secrets with KMS and Google CloudbuildThis article is meant to help a developer manage their secrets when deploying an application to Google Application Engine with the…Feb 4, 20191Feb 4, 20191
Published inCoinmonksContributing to Open-Source Crypto ProjectsOpen-Source software and the trustless principles of crypto go hand-in-hand. It’s no surprise that many of the crypto projects have either…Jan 22, 2019Jan 22, 2019
Published inCoinmonksA Security Token — Harbor’s R-TokenIn this article we will look into Harbor’s security token implementation, the R-Token. We will take a look at the high-level architecture…Dec 21, 2018Dec 21, 2018
Published inCoinmonksA Security Token — RevealedAn introduction and basic analysis of the key features needed for a security token. This is the first part of a series of articles where…Dec 17, 2018Dec 17, 2018