📄️ Using Onchain Trades to Identify Regime Changes and Stationarity of Financial Data
How to use on-chain DEX trade data to detect regime changes and test stationarity of financial time series. Covers flow-to-volume ratios, ADF tests, and how to avoid training ML models on non-stationary data.
📄️ Simulating a TRON Transaction's Gossip Trace from Public Listener IPs
A TRON transaction spreads across the network the same way a rumor spreads across a crowded room. This post takes 7,637 public TRON listener IPs from the TronScan nodemap, connects listeners within 800 km using the haversine formula, and walks a synchronous BFS wavefront outward from a synthetic Frankfurt origin — reaching 3,380 nodes in eight hops with visible geographic chokepoints and isolated islands. Covers what raw listener IPs reveal once paired with coordinates, and the random geometric graph and percolation mathematics underneath.
📄️ Blockchain Data Observability: When Your Data Pipeline Goes Offline
How to build an observability pipeline for blockchain data infrastructure using OpenTelemetry. Covers metrics, logs, and traces for Solana trading bots and node operators to detect stale feeds and pipeline failures.
📄️ Tornado Cash Intelligent Demixer: Transaction Attribution Through Behavioral Analysis
A proof-of-concept algorithm that matches Tornado Cash deposits to withdrawals using a 4-point behavioral scoring system. Demonstrates how transaction attribution can break mixer privacy guarantees.
📄️ Hedgey Finance Exploit: Six Months Later, Lessons Learned, and Code Revamped
Six months after the Hedgey Finance exploit ($2M lost on Ethereum + Arbitrum BONUS tokens), a post-mortem on the ClaimCampaigns.sol vulnerability, what was learned, and how the code was revamped.
📄️ Google Dorks for Smart Contract Security: Finding Vulnerabilities Before They're Exploited
Using Google Dorking to find exposed smart contract vulnerabilities before attackers do. Practical search queries for auditors and security researchers, with a video walkthrough.
📄️ How to Track the Internet with Shodan API
A hands-on tutorial for using the Shodan API to query internet-connected devices, analyze network infrastructure, and understand security postures across global internet exposure data.
📄️ Four Addresses, Unlimited Authority! This Test Code Snippet Halted Polygon Nodes on Dec 18, 2025
A hard-coded test exception allowing four addresses to bypass validator rules halted Polygon Bor nodes on December 18, 2025. Analysis of the consensus failure, the patch, and what it reveals about validator set security.
📄️ The End of EOAs? How RIP-7212 Changes Everything
RIP-7212 introduces secp256r1 precompile support on Ethereum rollups, enabling hardware-backed signatures and passkey-based account abstraction. Here's what changes and why it matters.