DEV Community

Blockchain

A decentralized, distributed, and oftentimes public, digital ledger consisting of records called blocks that are used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When CPUs Hit 100%: Hard-Earned Lessons from a Multichain Indexer Outage, with Bloom Filters as the Rescue.

When CPUs Hit 100%: Hard-Earned Lessons from a Multichain Indexer Outage, with Bloom Filters as the Rescue.

Comments
3 min read
# LAW-T: Building a Time-Native Programming Language (Let's Build It Together)

# LAW-T: Building a Time-Native Programming Language (Let's Build It Together)

4
Comments
8 min read
🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

5
Comments
3 min read
The 🐍 SDK for the Uniswap Universal Router 🦄 is part of Hacktoberfest 2025

The 🐍 SDK for the Uniswap Universal Router 🦄 is part of Hacktoberfest 2025

Comments
1 min read
🧠 What Is the EVM? The Engine That Powers Smart Contracts

🧠 What Is the EVM? The Engine That Powers Smart Contracts

2
Comments
3 min read
🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many

🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many

Comments
3 min read
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

9
Comments
5 min read
EVM 小写地址转换为标准地址:(大小写混合)

EVM 小写地址转换为标准地址:(大小写混合)

Comments
1 min read
JOURNEY INTO BLOCKCHAIN DEVELOPMENT THE EASY WAY

JOURNEY INTO BLOCKCHAIN DEVELOPMENT THE EASY WAY

Comments
4 min read
From Trust to Consensus: How Stellar Reaches Agreement Without Mining

From Trust to Consensus: How Stellar Reaches Agreement Without Mining

1
Comments
2 min read
Cloud vs Edge vs Local Architecture for Security Camera

Cloud vs Edge vs Local Architecture for Security Camera

Comments
2 min read
From Request to Revenue with the New x402 Protocol

From Request to Revenue with the New x402 Protocol

6
Comments
3 min read
When Telegram Cocoon Goes Live: The Future of the AI Internet

When Telegram Cocoon Goes Live: The Future of the AI Internet

Comments
3 min read
Gbit Framework

Gbit Framework

Comments
1 min read
Connecting to the Ethereum Blockchain

Connecting to the Ethereum Blockchain

1
Comments
2 min read
How We Built an AI That Transforms Your Photos Into Pixel Art in 10 Seconds (And Why It Matters for Web3)

How We Built an AI That Transforms Your Photos Into Pixel Art in 10 Seconds (And Why It Matters for Web3)

3
Comments
6 min read
How Wallet-as-a-Service Can Save Your Crypto Startup from Infrastructure Headaches

How Wallet-as-a-Service Can Save Your Crypto Startup from Infrastructure Headaches

4
Comments 1
3 min read
Your AI Agent Just Sent an Invoice (ERC-8004 + x402 in 5 Minutes)

Your AI Agent Just Sent an Invoice (ERC-8004 + x402 in 5 Minutes)

Comments
4 min read
How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

4
Comments
5 min read
Blockchain and Smart Contracts: The Future of Decentralized Development

Blockchain and Smart Contracts: The Future of Decentralized Development

1
Comments 2
5 min read
How to Interact with a Pizza Charity ink! Smart Contract with PAPI and Reactive DOT

How to Interact with a Pizza Charity ink! Smart Contract with PAPI and Reactive DOT

Comments
4 min read
What if the Internet had been built differently?

What if the Internet had been built differently?

10
Comments
3 min read
Privacy-Friendly Web3 Analytics: A Guide to User Privacy for Onchain Apps and Protocols

Privacy-Friendly Web3 Analytics: A Guide to User Privacy for Onchain Apps and Protocols

1
Comments 1
14 min read
How to Use Apidog for AI Test Case Generation

How to Use Apidog for AI Test Case Generation

42
Comments
7 min read
🔱 Trinity Protocol v1.5: Achieving Audit-Ready Status with Zero Critical Vulnerabilities

🔱 Trinity Protocol v1.5: Achieving Audit-Ready Status with Zero Critical Vulnerabilities

Comments
4 min read
loading...