"$BUD"

Search result of

Courses (0)

Articles (6)

Glossary (0)

Pepe vs Bonk vs Floki: Which Memecoin Can Dethrone Dogecoin?
Intermediate

Pepe vs Bonk vs Floki: Which Memecoin Can Dethrone Dogecoin?

The cryptocurrency space is exceptionally active, with memecoins becoming key buzzwords driven by online communities and the latest trends. Dogecoin has consistently led the pack, establishing itself as the top memecoin with its Shiba Inu mascot and its fun, friendly history. This article examines the strengths and weaknesses of emerging memecoins to assess their potential to dethrone the current leader.
8/20/2024, 9:58:54 AM
The Allure of MEV: Why Decentralizing Sequencers is Hard
Intermediate

The Allure of MEV: Why Decentralizing Sequencers is Hard

This article addresses the issue of sequencer centralization. All major Layer2 Rollups have included the decentralization of sequencers in their roadmaps, but this is still a short to mid-term goal that has not yet been achieved. The reason for this is that the decentralization of sequencers is not a technical issue, but an economic one.
2/28/2024, 1:20:03 PM
Culture For Sale
Intermediate

Culture For Sale

This article explores how memes, as fundamental units of cultural transmission, carry and convey ideas across different eras. It analyzes the role of communities in cultural formation and uses Bitcoin and gold as examples to demonstrate how memes become stores of value and cultural symbols.
11/26/2024, 6:05:54 AM
Best Practices for Developing Secure Web3 Applications: Building Trustworthy DApps
Beginner

Best Practices for Developing Secure Web3 Applications: Building Trustworthy DApps

This article emphasizes that comprehensive design, testing, and implementation are essential to ensure the reliability and trustworthiness of DApps in the blockchain environment.
2/19/2024, 9:08:14 AM
Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example
Beginner

Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example

On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, where over $1.5 billion in assets were stolen. This incident is similar to the attack on the Radiant Capital cross-chain lending protocol in October 2025, where attackers stole funds by controlling multi-signature private keys and exploiting contract vulnerabilities. Both incidents highlight the increasing complexity of hacker attacks and expose security vulnerabilities in the crypto industry. This article provides an in-depth analysis of the technical details of the Radiant incident, focusing on the abuse of malicious contracts and multi-signature wallets. The article concludes by emphasizing the urgent need to strengthen industry security measures to protect user assets.
2/22/2025, 4:21:23 AM
The splendid bubble and the lost truth of celebrity tokens
Beginner

The splendid bubble and the lost truth of celebrity tokens

The HAWK token was originally intended to provide financial support for pet charities, but its skyrocketing and plummeting after listing revealed the common scam patterns in the cryptocurrency market. Hailey Welch's token saw its market value soar to $490 million in just three hours, only to plunge by 91% shortly after, resulting in significant losses for many investors. The underlying issues of token concentration distribution, early 'sniping' profits, and the significant risks of celebrity tokens have made this event another typical case in the cryptocurrency field.
2/17/2025, 2:17:49 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective