Solana Account Fundamentals: Part 1 -The Building BlocksSolana’s account system forms the backbone of its high-performance blockchain architecture. In this comprehensive guide, we’ll explore how…Jan 263Jan 263
Program Derived Addresses (PDAs) in Solana: What, Why, and How?When learning about Solana, you’ll often hear about Program Derived Addresses (PDAs). They’re like these — powerful, versatile, and most…Jan 12Jan 12
Building a Price-Tracking and Automated Trading Bot in RustIn this article, I’m excited to share a project I’ve been working on: a Rust-based bot for tracking cryptocurrency prices and performing…Dec 27, 2024Dec 27, 2024
Under the Hood of Solana Transactions: From PoH to BPF ExecutionWelcome back! If you read my last article on Solana’s Proof of History (PoH), you know PoH is like the backstage manager, ensuring…Nov 5, 2024Nov 5, 2024
Exploring Solana’s Consensus- What Makes Proof of Stake and Proof of History So Fast?If you’re curious about what makes Solana stand out in the blockchain world, you’re not alone. Honestly, when I first dug into it, I was…Nov 1, 20241Nov 1, 20241
Huff vs Yul: Mastering EVM Storage Optimization for Gas EfficiencyWhen optimizing Ethereum Virtual Machine (EVM) storage and gas efficiency, two low-level programming languages are like the Batman and…Sep 28, 2024Sep 28, 2024
Ethereum Virtual Machine (EVM) vs Traditional Operating Systems: A Simple Guide (Part 3)Welcome back to the final chapter of our Ethereum Virtual Machine (EVM) deep dive. So far, we’ve explored Part 1 and Part 2, how the EVM…Sep 23, 2024Sep 23, 2024
Ethereum Virtual Machine (EVM) vs Traditional Operating Systems: A Simple Guide (Part 2)In the first part of this series, we explored the key differences between Ethereum’s Virtual Machine (EVM) and traditional operating…Sep 11, 2024Sep 11, 2024
Ethereum Virtual Machine (EVM) vs Traditional Operating Systems: A Simple Guide (Part 1)In the world of decentralized finance (DeFi), understanding how Ethereum’s virtual machine (EVM) compares to traditional operating systems…Sep 7, 2024Sep 7, 2024
XXE, how did a feature become a critical vulnerability?This is my take on XML External Entities and how a feature of this front-end language intrigued the security researchers and how it was…Oct 25, 2021Oct 25, 2021