Tokenization: Unlocking the Potential of Infrastructure Finance

• Dr. Yifeng Tian is the first researcher to introduce and conduct a systematic analysis of blockchain-enabled finance in infrastructure investment.
• The interview covers whether it is feasible for blockchain-enabled tokenization to be applied in infrastructure finance, how tokenization of infrastructure on blockchain works, and why Dr. Yifeng Tian’s team was motivated to seize the opportunity.
• The research suggests that most types of public or private sector infrastructure can benefit from tokenization, provided investors are offered sufficient economic returns as incentives to compensate for the risks.

Interview with Dr. Yifeng Tian on Blockchain Tokenization in Infrastructure Finance

Feasibility of Applying Tokenization

Dr. Yifeng Tian’s research suggests that most types of public or private sector infrastructure can benefit from tokenization, provided investors are offered sufficient economic returns as incentives to compensate for the risks. As an example, he proposed that a wind farm valued at $5m could be represented by 5 million digital tokens each priced at $1 and backed by this asset.

How Does Tokenization Work?

Revenue generating projects will pay dividends or interest from their cash flows while non-revenue generating projects may use availability payments from governments to ensure financial availability. For public infrastructure financing, government bonds can also be tokenized while private infrastructures may have corporate equity, corporate bonds, project equity, project bonds and infrastructure funds all subject to tokenization processes.

Motivations Behind Introducing Tokenization

Dr. Yifeng Tian was inspired by real estate tokenization when his team began researching ways in which blockchain technology could be leveraged to promote sustainable goals through improved infrastructure investment opportunities. The team saw this as an amazing opportunity and decided to seize it so they could continue building solutions that would help bridge the gap between traditional finance systems and emerging technologies such as blockchain technology and cryptocurrency markets.


Through his research and subsequent interviews with crypto news outlets like ours, Dr Yifeng Tian has proved that there is immense potential for benefiting both individuals and businesses who want access to improved financing solutions for their investments in infrastructure assets by leveraging blockchain technology through tokenizing them on distributed ledgers like Ethereum or other similar networks .

Cité Gestion Tokenizes Shares, Paving the Way for TradFi to Web3

• Swiss bank Cité Gestion is collaborating with digital assets company Taurus to tokenize its shares.
• The tokenization process was accomplished under the standards set forth by the Capital Markets and Technology Association (CMTA).
• Tokenization is a relatively new trend in the financial infrastructure world, earning the trust of banking institutions, paving the way for TradFi players to bring more investors into the web3 era.

Swiss private bank Cité Gestion has announced its collaboration with digital assets company Taurus to tokenize its shares. This initiative by Cité Gestion will enable the bank to issue tokenized shares following Swiss law governing ledger-based securities. The tokenization process was accomplished under the standards set forth by the Capital Markets and Technology Association (CMTA).

The partnership with Taurus will enable the bank to implement smart contracts for issuing and listing its tokenized shares. According to the bank’s Deputy CEO, Christophe Utelli, the CMTA standard was the natural choice for the tokenization, as it ensures that an adequate risk management framework is at the heart of the process.

Tokenization is a relatively new trend in the financial infrastructure world, but it has rapidly earned the trust of banking institutions. This trust has paved the way for traditional finance (TradFi) players to bring more investors into the web3 era. Taurus stated that their partnership with Cité Gestion will provide a secure and compliant tokenized security issuance and listing to Cité’s shareholders.

The tokenization of the bank’s shares will offer its shareholders additional features and enhanced encryption. This will make it easier for investors to keep track of their investments and ensure that their assets are securely stored. It will also enable the bank to access a new pool of potential investors and expand its presence in the blockchain-based payment industry.

Cité Gestion’s tokenization of its shares is the first step towards a larger shift in the banking sector towards digital assets. This move will make it easier for banks to offer their services in a secure and efficient manner, as well as open up more investment opportunities to their customers. The tokenization of assets is quickly becoming a norm in the finance industry, and Cité Gestion’s move is likely to encourage other banks to follow suit.

Midas Capital Pauses Borrowing After Suspicious Transaction with WMATIC_STMATIC

Bullet Points:
1. Midas Capital paused borrowing activities due to a suspicious transaction involving a recently added collateral token.
2. The token, WMATIC_STMATIC, was listed with a supply cap of 250,000 to prevent grand borrows against the Liquidity pool.
3. Midas Capital had previously experienced a similar event when they launched BNB with Ellipsis, leading them to back LP tokens as collaterals.

Midas Capital, a venture capital organization that funds and supports blockchain projects to their success, recently announced that they had paused borrowing activities on their Jarvis Polygon pool due to an investigation of a suspicious transaction. Blockchain security watch firm Certik Alert revealed that the exploiter had gained 663,101 MATIC, worth $660,000 at the time of writing.

The token involved in this suspicious transaction was WMATIC_STMATIC, which was listed last week on the official Midas Capital website with a supply cap of 250,000. The company had discussed the idea of adding this token with their team, Jarvis network, in order to provide new options for pool utilizers. In addition, the supply cap was implemented in order to prevent grand borrows against the Liquidity pool tokens.

Midas Capital stated that they had made a wrong judgment in assuming that the pool was solely comprised of ERC20’s wrapped assets. They also believed that the previous re-entry attack wouldn’t affect them while using ‚raw call‘ the chain’s native token. Unfortunately, this was not the case and the company had experienced a similar event prior to the launch of BNB with Ellipsis when they had heavily backed LP tokens as collaterals.

Overall, this issue is currently being investigated and Midas Capital has taken the necessary steps to ensure that a similar situation does not occur in the future. They are confident that their oracle emanates from the Ethereum blockchain, which is a much more secure platform than they had previously thought. As of now, the company is working to resolve the issue and will continue to monitor the situation.

FTX and Affiliated Debtors Reach Agreement to Streamline Liquidation

• FTX and its affiliated debtors have reached a cooperation agreement to streamline the liquidation of FTX’s subsidiary in the Bahamas.
• The agreement involves harmonizing the parallel FTX liquidation processes in Delaware and the Bahamas.
• FTX US and Bahamas groups have also affirmed a procedure to clarify the inventory underneath its regulation.

FTX, a bankrupt cryptocurrency exchange, and its affiliated debtors have entered into a cooperation agreement to efficiently streamline the liquidation of FTX’s subsidiary located in the Bahamas. The agreement, which was made due to the parallel FTX liquidation processes taking place in Delaware, where the company sought Chapter 11 bankruptcy protection, and the Bahamas, the location of FTX Digital Markets, seeks to harmonize the two jurisdictions involved in order to protect the interests of all parties affiliated with the exchange.

The joint interim trustees and the FTX debtors released a press statement, detailing their understanding of how they would cooperate in each jurisdiction. They also announced a procedure to clarify the inventory underneath their regulation, and are confident that the Bahamian Securities Commission (BSC) has protected their virtual assets.

John Ray III, FTX liquidations CEO, suggested that there were still some differences present in the disagreements between parties, despite their agreement. He added that there were still some gatherings of minds needed in order to bring the two sides to a mutual understanding.

The details of the agreement remain undisclosed, though it is believed that the agreement will facilitate a smoother liquidation process for FTX and its debtors. This is likely to be welcomed by FTX customers, who were left in limbo after the exchange filed for Chapter 11 bankruptcy protection in November, owing $3.1 billion to its 50 biggest lenders.

NFT Market Resilient Despite Bearish Crypto Trend: Trading Volume Dips, But NFTs Thrive

• The NFT market has continued to thrive despite the overall bearish trend in cryptocurrency.
• In 2022, the NFT market saw a slight decrease in trading volume, though the number of NFTs traded increased significantly.
• Major cryptocurrencies crashed, sending the entire market into a frenzy, resulting in a drop in NFT prices.

The non-fungible token (NFT) market has remained resilient despite the bearish trend in cryptocurrency that has swept the market. According to NFTGO data, the single-day trading volume of the NFT market on Jan.5 exceeded 32,000 ETH, the highest level in three months. OpenSea’s ETH-denominated trading volume also reached a two-month high on the same day.

Although 2021 was the year NFTs most notably caught on, the interest in them decreased significantly in 2022. During that year, trading volume on the OpenSea platform, one of the biggest marketplaces for NFTs, dropped to around $350 million from $3 billion. DappRadar reported that the organic trading volume generated by the NFT market in 2022 was around $24.7 billion, a slight decrease from the $25.1 billion recorded in 2021.

The public scandals in the crypto market, such as the FTX collapse and the general waning interest in NFTs, contributed to the downfall of the NFT market in 2022. Additionally, major cryptocurrencies crashed, sending the entire market into a frenzy. This caused a drop in NFT prices, though the number of NFTs traded increased significantly.

The first quarter of 2022 saw a promising start for the NFT market, with DappRadar reporting a total trading volume of $12.4 billion. However, the following quarter saw a steady decline. During the second quarter, the trading volume was $8.4 billion, followed by the third quarter at $2.6 billion and the fourth quarter at $1.2 billion.

Despite the bearish trend in cryptocurrency, the NFT market has managed to remain resilient. Though the interest in NFTs decreased in 2022, the number of NFTs traded increased significantly. The public scandals and major cryptocurrency crashes caused a decrease in NFT prices, though the market still had a strong start in 2022. The NFT market continues to make strides and will continue to do so in the future.

Voordelen van de 51% Aanval

De 51% aanval is een vorm van cyberaanval waarbij aanvallers de controle over een blockchain-netwerk of negen van een cryptocurrency-netwerk overnemen. Het is een manier voor aanvallers om de controle over de blockchain- of cryptocurrency-netwerken te krijgen en het netwerk te manipuleren. In dit artikel zullen we de voordelen en nadelen van de 51% aanval bespreken, wat precies de 51% aanval is, hoe het netwerk wordt gehackt, hoe je een 51% aanval kunt voorkomen en wat er gebeurt wanneer een 51% aanval plaatsvindt.

Wat is een 51% Aanval?

Een 51% aanval is een vorm van cyberaanval die wordt gebruikt om de controle over een blockchain- of cryptocurrency-netwerk over te nemen. Het is een manier voor aanvallers om het netwerk te manipuleren en de validatieregels te veranderen. Aanvallers kunnen transacties verwerken of verwerpen, nieuwe blokken toevoegen of verwijderen en zelfs transacties herroepen.

Hoe voorkom je een 51% Aanval?

Er zijn een aantal manieren om een 51% aanval te voorkomen. Ten eerste is het belangrijk dat cryptocurrency-netwerken gebruik maken van een proof-of-stake-mechanisme, in plaats van een proof-of-work-mechanisme. In een proof-of-stake-systeem worden miners beloond met beloningen voor het houden van tokens in plaats van het verwerken van transacties. Dit maakt het moeilijker voor aanvallers om meer dan 50% van de hashing-kracht in het netwerk te verwerven.

Een andere manier om een 51% aanval te voorkomen, is door het gebruik van diensten zoals Anon System. Anon System biedt een dienst waarmee gebruikers hun cryptocurrency-netwerken kunnen beschermen tegen 51% aanvallen door middel van hun dienst. Anon System gebruikt geavanceerde technologieën zoals decentralisatie, multi-signature-wallet-integratie en meer om de veiligheid van het netwerk te garanderen.

Hoe werkt het?

De 51% aanval is een soort van double-spend-aanval, waardoor een aanvaller twee verschillende transacties kan verzenden met dezelfde cryptocurrency. Om dit te bereiken, moet de aanvaller de meerderheid van de hashing-kracht in het netwerk bezitten. Als de aanvaller meer dan 50% van de hashing-kracht in het netwerk bezit, heeft hij de controle over het netwerk en kan hij transacties verwerken of verwerpen, blokken toevoegen of verwijderen en zelfs transacties herroepen.

Voordelen van de 51% Aanval

De 51% aanval biedt een aantal voordelen voor aanvallers. Ten eerste kan de aanvaller zijn eigen transacties verwerken, waardoor hij dubbel spenderen kan voorkomen. Ten tweede kan de aanvaller het netwerk manipuleren door het verwerken van transacties, blokken toevoegen en verwijderen en zelfs transacties herroepen. Ten derde kan de aanvaller nieuwe blokken maken en toevoegen aan het netwerk, waardoor hij de transactiegegevens kan vervalsen en de transactiehistorie kan manipuleren.

Nadelen van de 51% Aanval

Hoewel de 51% aanval veel voordelen biedt, heeft het ook een aantal nadelen. Ten eerste is het een zeer kostbare aanval, omdat de aanvaller meer dan 50% van de hashing-kracht in het netwerk moet bezitten. Ten tweede kan de aanvaller de transactiegegevens vervalsen en de transactiehistorie manipuleren, waardoor het netwerk wordt verzwakt. Ten derde kan de aanvaller de validatieregels veranderen, waardoor het netwerk minder veilig wordt.

Cryptocurrency Netwerken en de 51% Aanval

De 51% aanval is een belangrijk risico voor veel cryptocurrency-netwerken. De meeste cryptocurrency-netwerken, waaronder Bitcoin, Ethereum en Litecoin, zijn vatbaar voor de 51% aanval. Aanvallers kunnen deze netwerken hacken en de transactiegegevens vervalsen, waardoor het netwerk wordt verzwakt.

Hoe komt het dat Cryptocurrency Netwerken vatbaar zijn voor de 51% Aanval?

De vatbaarheid van cryptocurrency-netwerken voor de 51% aanval komt voort uit het feit dat de meeste cryptocurrency-netwerken gebruik maken van een proof-of-work-consensusmechanisme. In dit mechanisme worden miners beloond voor het verwerken van transacties en het toevoegen van nieuwe blokken aan het netwerk. Aanvallers kunnen dit gebruiken om meer dan 50% van de hashing-kracht in het netwerk te verwerven, waardoor ze de transactiegegevens kunnen vervalsen en de transactiehistorie kunnen manipuleren.

Gevallen van 51% Aanvallen

Er zijn verschillende gevallen waarin een 51% aanval is gebruikt om cryptocurrency-netwerken te hacken. In 2018 werden er een aantal 51% aanvallen gerapporteerd, waaronder een aanval op Bitcoin Gold, Verge en Ethereum Classic. In 2019 werd er een aanval gerapporteerd op het Zcash-netwerk, waarbij de aanvallers meer dan $50.000 aan cryptocurrency stalen.


De 51% aanval is een vorm van cyberaanval waarbij aanvallers de controle over een blockchain-netwerk of negen van een cryptocurrency-netwerk overnemen. Het is een manier voor aanvallers om de controle over de blockchain- of cryptocurrency-netwerken te krijgen en het netwerk te manipuleren. De 51% aanval biedt een aantal voordelen voor aanvallers, maar het is ook een zeer kostbare aanval en heeft ook enkele nadelen. Om een 51% aanval te voorkomen, is het belangrijk dat cryptocurrency-netwerken gebruik maken van een proof-of-stake-mechanisme en dat diensten zoals Anon System worden gebruikt om het netwerk te beschermen.

Windows Live Mail-Fehler 0x800CCC0B beheben

Windows Live Mail ist der E-Mail-Client, der Teil der Windows Live-Anwendungssuite von Microsoft ist. Ein häufiger Fehler, der bei der Verwendung von Live Mail auftritt, hat mit der Authentifizierung eines Servers für ausgehende E-Mails zu tun. Erfahren Sie, wie Sie den Windows Live Mail-Fehler 0x800CCC0B beheben können.

Authentifizierung von Servern für ausgehende E-Mails

Beim Empfang von E-Mails in einem beliebigen E-Mail-Client ist es erforderlich, einen Benutzernamen und ein Kennwort zu verwenden, um zu authentifizieren, dass Sie das Recht haben, die E-Mails in Ihrem Konto zu empfangen. Der Post Office Protocol (POP)-Server, der von Ihrem E-Mail-Anbieter verwaltet wird, bearbeitet die eingehenden E-Mails.

Viele E-Mail-Dienstanbieter verlangen jedoch keine Authentifizierung für ausgehende E-Mails. Die meisten E-Mail-Dienstanbieter verwenden das Simple Mail Transfer Protocol (SMTP), um ausgehende E-Mails zu verarbeiten.

Wenn Sie den Windows Live Mail-Fehler 0x800CCC0B erhalten, ist es möglich, dass Ihr E-Mail-Dienstanbieter eine Authentifizierung sowohl für ausgehende als auch für eingehende E-Mails verlangt.

In Windows Live Mail können Sie die Authentifizierung für einzelne Konten aktivieren. Vergewissern Sie sich, dass Sie die Lösung nur auf die Konten anwenden, bei denen der Fehler auftritt, bevor Sie mit der folgenden Lösung fortfahren. Das Hinzufügen der Authentifizierung zu einem Konto, für das sie nicht erforderlich ist, kann zu weiteren Fehlern bei diesem Konto führen.

Fehler 0x800CCC0B in Windows Live Mail beheben

Öffnen Sie Windows Live Mail und klicken Sie auf die Registerkarte Konten. Klicken Sie auf das E-Mail-Konto, bei dem der Fehler auftritt, und klicken Sie dann auf die Schaltfläche Eigenschaften.

Sie sollten nun die Eigenschaften Ihres E-Mail-Kontos sehen. Klicken Sie auf die Registerkarte Server und suchen Sie den Abschnitt des Fensters mit dem Titel Postausgangsserver. Aktivieren Sie das Kontrollkästchen Mein Server erfordert eine Authentifizierung.

Normalerweise verwendet Ihr E-Mail-Dienstanbieter für ausgehende E-Mails denselben Benutzernamen und dasselbe Kennwort wie für eingehende E-Mails, um zu authentifizieren, dass Sie zum Senden von E-Mails über das Konto berechtigt sind. Sollte dies nicht der Fall sein, klicken Sie auf die Schaltfläche Einstellungen.

Sie sollten nun das Fenster mit den Eigenschaften des Postausgangsservers sehen. Standardmäßig ist die Option Dieselben Einstellungen wie für den Posteingangsserver verwenden ausgewählt.

Aktivieren Sie die Option Anmelden mit. Geben Sie Ihren Kontonamen und Ihr Passwort für ausgehende E-Mails ein.

Es liegt an Ihnen, ob Sie die Option Kennwort speichern wählen. Wenn Sie nicht gerade einen PC an einem unsicheren Ort verwenden, sollten Sie diese Option aktiviert lassen.

Andernfalls müssen Sie jedes Mal Ihren Benutzernamen und Ihr Kennwort eingeben, wenn Sie eine E-Mail von diesem Konto aus versenden möchten. Klicken Sie auf die Schaltfläche OK im Fenster und anschließend auf die Schaltfläche OK im Fenster Eigenschaften. Senden Sie eine E-Mail von diesem Konto und sehen Sie, ob der Fehler verschwindet.

Windows Live Mail ist wie jeder E-Mail-Client in der Lage, E-Mails von Ihrem E-Mail-Dienstanbieter sicher zu empfangen und zu senden. Bei einigen Dienstanbietern ist eine Serverauthentifizierung sowohl für eingehende als auch für ausgehende E-Mails erforderlich.

Dies kann zu einem Windows Live-Fehler führen. Sie können den Windows Live-Fehler 0x800CCC0B beheben, indem Sie eine einfache Option in der Anwendung aktivieren und optional Informationen zu Benutzername und Kennwort hinzufügen.

So ändern Sie das Profilbild Ihres Kontos in Windows 10

Sind Sie es leid, Ihr aktuelles Windows 10-Profilbild zu sehen? Dann wird es Zeit, es zu ändern. Die erforderlichen Schritte variieren je nachdem, ob Sie ein lokales Konto oder ein Microsoft-Konto verwenden.

Lesen Sie weiter für die Schritte für ein lokales Konto, oder springen Sie zum Abschnitt „Microsoft-Konten“, wenn Sie ein mit der Cloud verbundenes Konto verwenden. Wenn Sie nicht sicher sind, was auf Sie zutrifft, beginnen Sie mit den ersten Schritten unten.

Lokale Konten

Profilbilder für lokale Konten werden über die App „Einstellungen“ gesteuert. Starten Sie die Einstellungen über das Startmenü und klicken Sie auf den Abschnitt „Konten“. Sie gelangen auf die Seite „Ihre Daten“.

Ihr aktuelles Foto wird an prominenter Stelle angezeigt. Klicken Sie unten auf die Schaltfläche „Nach einem suchen“, um ein neues Bild für Ihr Konto auszuwählen. Alternativ können Sie auch auf die Schaltfläche „Kamera“ klicken (falls Ihr Gerät über eine solche verfügt), um ein neues Selfie aufzunehmen.

Sie können ganz einfach zu einem zuvor verwendeten Foto zurückkehren – Ihre drei zuletzt ausgewählten Bilder werden als Miniaturansichten unter Ihrem Profilbild angezeigt. Klicken Sie auf eines der Miniaturbilder, um sofort zu ihm zurückzukehren.


Wenn Sie ein Microsoft-Konto verwenden, können Sie Ihr Profilbild weiterhin über die Einstellungen-App aktualisieren. Verwenden Sie dazu das oben beschriebene Verfahren. Alternativ können Sie auch die Microsoft-Konto-Website verwenden, um Ihr Bild von überall aus zu ändern, auch wenn Sie keinen Zugriff auf Ihren PC haben.

Unabhängig davon, welche Methode Sie verwenden, gilt die Änderung für alle Microsoft-Dienste, in denen Ihr Profilbild angezeigt wird. Es kann ein wenig dauern, bis alle Websites und Geräte das neue Bild anzeigen.

Um das Online-Verfahren zu nutzen, melden Sie sich unter an und klicken Sie oben auf der Seite auf die Schaltfläche „Ihre Daten“. Klicken Sie auf den Link „Bild ändern“, um den Auswahlprozess zu starten.

Die Bildauswahl öffnet einen einfachen Editor, mit dem Sie Ihr aktuelles Foto zuschneiden können. Klicken Sie auf die Schaltfläche „Neues Bild“, um ein anderes Bild aus Ihrem Dateisystem auszuwählen. Sie können es dann nach Belieben zuschneiden und in der Größe verändern.

Sobald Sie die Änderungen gespeichert haben, sollte das neue Profilbild auf alle Ihre Windows-Geräte übertragen werden. Es wird auch in den Online-Diensten von Microsoft angezeigt, z. B. in und

Stratis collabora con C # Corner per espandere la comunità di sviluppatori

Stratis, la piattaforma blockchain-as-a-service, espande la portata degli sviluppatori collaborando con C # Corner, il più grande e attivo gruppo di sviluppatori C # al mondo.

2 aprile 2021, Londra, Regno Unito -   Stratis  ha raggiunto un altro traguardo in quanto collabora con  C # Corner , una comunità di membri 3M + che lavora per il progresso della conoscenza e della tecnologia software. L’attenzione di Stratis per sfruttare le tecnologie Microsoft, in particolare il linguaggio di programmazione C #, significa che una pletora di programmatori in tutto il mondo si svilupperà e si supporterà a vicenda per costruire con Stratis Blockchain Technologies.

La partnership influenzerà diverse attività svolte nei prossimi mesi, a partire da un team di sviluppo blockchain di Stratis dedicato incentrato sullo sviluppo di casi d’uso pratici che utilizzano Stratis

Il team di sviluppo di C # Corner si impegnerà a fornire più soluzioni, dimostrando infine la potenza della piattaforma sviluppata da Stratis.

Inoltre, Stratis lavorerà insieme a C # Corner per eseguire eventi di hackathon mirati ogni trimestre, fornendo montepremi a coloro che partecipano alla dimostrazione di casi d’uso blockchain con la soluzione di contratto intelligente di Stratis. Stratis mira a creare una vasta rete di sviluppatori in grado di progettare, costruire e distribuire applicazioni funzionali su Stratis. La crescita di una ricca e competente comunità di sviluppatori guiderà senza dubbio l’adozione e lo sviluppo.

Questa partnership introdurrà anche l’attesissimo programma di certificazione Certified Stratis Blockchain Expert, che si rivolge a coloro che progettano soluzioni blockchain utilizzando Stratis. La certificazione garantisce che un individuo abbia una profonda comprensione dei concetti fondamentali della blockchain e della loro fattibilità e dimostra le migliori pratiche stabilite dal team di sviluppo principale di Stratis.

Stratis avrà anche un’area dedicata nella sezione Learn di C # Corner, dove chi è interessato allo sviluppo della blockchain potrà approfondire le proprie competenze seguendo tutorial guidati da istruttori.

Angolo C #: community Microsoft incentrata sullo stack

C # Corner , classificato al di sotto di 2.800 a livello globale e fondato nel 2000, è una delle più grandi comunità online di sviluppatori C # e .NET. C # Corner raggiunge quasi 5 milioni di sviluppatori ogni mese e fornisce aggiornamenti giornalieri sulle novità in materia di sviluppo software. C # Corner ha 1,2 milioni di follower su Facebook e diverse migliaia di follower su Twitter e altre piattaforme di social media.

I membri di C # Corner pubblicano quotidianamente contenuti aggiornati sull’apprendimento e sulla creazione di software migliore. I membri condividono le loro conoscenze tramite articoli, post sul blog, domande sul forum e consigli sulla carriera. C # Corner fornisce anche contenuti di apprendimento, inclusi video, tutorial di apprendimento, spettacoli dal vivo, nonché l’organizzazione di numerose conferenze incentrate sugli sviluppatori che sono le conferenze per sviluppatori più importanti a livello globale. Il programma C # Corner MVP riconosce e premia i migliori esperti tecnici e leader di pensiero nello spazio e li promuove sulla sua piattaforma e sui social media.

Gli sviluppatori Microsoft esperti guidano il team di C # Corner, inclusi diversi MVP Microsoft, direttori regionali e formatori certificati. Mahesh Chand, fondatore di C # Corner, è 14 volte Microsoft MVP ed ex direttore regionale di Microsoft. Chand è anche un autore pubblicato e ha pubblicato una mezza dozzina di libri su C # e .NET.

YFI: users encouraged to take out insurance against hackers

Computer attacks prove that even the largest DeFi platforms are vulnerable.

Tether froze $ 1.7 million in USDT stolen from the operation.

Yearn Finance advises users to take out insurance to cover potential losses

On February 5, one of the most important platforms in decentralized finance suffered a lightning strike causing the loss of millions of dollars from one of its liquidity reserves . The incident shows that even big players are insecure, and Yearn is now advising users to get insurance.

YFI was the last to be exploited by a flash loan arbitrage attack that successfully thwarted the surveillance system, leaving no code hacked. The incident was the latest in a long line of similar exploits to hit the DeFi industry in 2020.

The Rekt blog analyzed the incident in its usual post-event fashion, confirming that the safe was attacked using nine flash loans.

In total, $ 11 million was lost in the safe. $ 2.7 million went to the attacker, $ 3.5 million went to liquidity providers Curve, $ 3.5 million went to actors in Curve, and $ 1.4 million was paid in fresh Aave v2.

He stressed that even the biggest platforms in the industry are not immune to falling victim, adding:

“To be the victim of an attack must be humiliating for the team which was once considered unbeatable. […] This attack went straight to the heart of one of the largest DeFi conglomerates, shaking the foundations of what was once considered an impenetrable fortress. ”

Rest assured!

Tether froze USDT 1.7 million that was stolen in the attack and could burn them, issuing more to pay off losses. This would then make it the same as a central bank, the blog said.

YFI’s response has been a little less constructive for those who have lost funds. The company said it is evaluating options to make the totalte Vault yDAI exploited by creating a Maker (CDP secured debt position) with YFI.

However, he said purchasing insurance from one of his partners would be a better option;

“In general, investing in YFI is at your own risk. If you want to protect yourself from exploiting external protocols in the future, consider taking out insurance for your deposits with Cover or Nexus mutual. „