Mark MathisinCoinmonksProduction Contract Security — Part 3In our previous articles, we delved into the world of multi-sig wallets and best practices surrounding them. Take a look at Part 1 and…10 min read·Jul 26, 2022----
Mark MathisinCoinmonksProduction Contract Security — Part 2Now that you have the basic idea of what a multisig is and how it can help you, let’s actually set one up. I’m going to walk you through…8 min read·May 14, 2022----
Mark MathisinCoinmonksProduction Contract Security — Part 1Congratulations! You just deployed your first smart contract to the mainnet and your platform launch is imminent. As you unlace your Air…5 min read·May 11, 2022----
Mark MathisinOrigin ProtocolA Minimal Proxy in the WildThe recent network load on Ethereum has caused teams both large and small to rethink and optimize their solidity and contract deployment…5 min read·Jun 11, 2021----
Mark MathisinOrigin ProtocolThree-time Grammy Winner Ryan Tedder to Debut NFTs on OriginOrigin is excited to announce the upcoming release of an exclusive NFT collection from the Grammy award-winning songwriter, producer, and…2 min read·Apr 14, 2021--1--1
Mark MathisCongratulations, it’s a lambdaYour first AWS Lambda function exposed via an API Gateway REST interface3 min read·Mar 11, 2019----
Mark MathisinGoogle Cloud - CommunityManaging Secrets with KMS and Google CloudbuildThis article is meant to help a developer manage their secrets when deploying an application to Google Application Engine with the…4 min read·Feb 4, 2019--1--1
Mark MathisinCoinmonksContributing to Open-Source Crypto ProjectsOpen-Source software and the trustless principles of crypto go hand-in-hand. It’s no surprise that many of the crypto projects have either…7 min read·Jan 22, 2019----
Mark MathisinCoinmonksA Security Token — Harbor’s R-TokenIn this article we will look into Harbor’s security token implementation, the R-Token. We will take a look at the high-level architecture…6 min read·Dec 21, 2018----
Mark MathisinCoinmonksA Security Token — RevealedAn introduction and basic analysis of the key features needed for a security token. This is the first part of a series of articles where…5 min read·Dec 17, 2018----