header image
avatar

DeFi Simon

DeFi Simon

Blockchain Engineer | Ex-PayPal | DeFi Hacker | Writer | Investor National University of Singapore
Subscribe to DeFi Simon
Receive the latest updates directly to your inbox.

Solana Cheatsheet

Publisher
DeFi Simon
April 12
In this blog, we will cover the basic building blocks of Solana, specifically: Accounts, Programs, Instructions, Transactions, RPCs, and Subscriptions.

Unveiling Websockets: Real-time Data for Blockchain and DeFi

Publisher
DeFi Simon
April 12
As blockchain engineers, we understand the importance of real-time data for building dynamic and responsive applications. In this blog post, we'll delve into WebSockets, a powerful technology that unlocks real-time communication for blockchain and Decentralized Finance (DeFi) projects.

Solidity vs. Rust: Choosing the Right Weapon for Solana Development

Publisher
DeFi Simon
April 12
The Solana blockchain has emerged as a major player in the crypto space, known for its blazing-fast transaction speeds and low fees. But for developers, the question arises: what language should you use to build smart contracts on Solana? This blog post dives into the two main contenders: Solidity (with Solang) and Rust, helping you choose the right tool for the job.

Create2 in Solidity

Publisher
DeFi Simon
March 28
CREATE2 opcode helps us to predict the address of smart contract before it is deployed on Ethereum network, and Uniswap created Pair contract with CREATE2 instead of CREATE.

Events in Solidity

Publisher
DeFi Simon
March 21
This blog introduces event in Solidity, using transfer events in ERC20 tokens as an example .

Storage vs. Memory vs. Calldata in Solidity

Publisher
DeFi Simon
March 20
Learn about the different data locations in Solidity and when to them.
Card Header

What is SIM Swap Attack?

Publisher
DeFi Simon
October 06
A SIM swap attack, also known as SIM card swapping or SIM card swapping fraud, is a type of cybercrime in which an attacker tricks or uses social engineering techniques to gain control of a target user's mobile phone number and the associated SIM card. Once the attacker successfully takes control of the target user's SIM card, they can intercept the target user's text messages, phone calls, and any authentication messages sent to the phone number. This enables them to carry out various malicious activities, including but not limited to:
Card Header

A comparison of BTFS, Amazon S3 and CDN

Publisher
DeFi Simon
July 22
BTFS, CDN, and Amazon S3 are technologies used for storing and transmitting data, but they have significant differences in design and implementation:
Card Header

Guide: Deploying Web App to BTFS (Part 2)

Publisher
DeFi Simon
July 22
Please refer to: Install BTFS Node