We Burned Down Players’ Houses in Ultima Online

Ultima Online is celebrating its 25th anniversary! You know what that means, right? Story time! | Continue reading


@blog.cotten.io | 1 year ago

We Burned Down Players’ Houses in Ultima Online

Ultima Online is celebrating its 25th anniversary! You know what that means, right? Story time! | Continue reading


@blog.cotten.io | 1 year ago

Tracing the Twitter Hacked Bitcoins

Following the Digital Trail of the CryptoForHealth Scammers | Continue reading


@blog.cotten.io | 3 years ago

Apple News Shows “Brown ” on Front Page – Thanks BuzzFeed

See How a BuzzFeed List Shocked iPhone Users | Continue reading


@blog.cotten.io | 4 years ago

How to Eat Gas in Ethereum – Consuming 99.9% of the Gas Limit

Consuming 99.9% of the Gas Limit in an Ethereum Transaction | Continue reading


@blog.cotten.io | 4 years ago

Greedy ‘Connect 4’ for Fun and Profit – Kaggle's New Simulations Contest

Implementing a Simple Agent in Kaggle’s New Simulations Competition | Continue reading


@blog.cotten.io | 4 years ago

“Here's my private key, try stealing my Ether!” – blockd's marketing stunt

An Attention Grabbing Marketing Stunt By blockd | Continue reading


@blog.cotten.io | 4 years ago

Have Google and Bing Gotten Better at Answering Questions? Zedah's Test Queries

A Survey of Test Queries from Lotfi Zadeh’s 2006 Work | Continue reading


@blog.cotten.io | 4 years ago

Delaying the Inevitable: Muir Glacier and the Ethereum Difficulty Bomb

EIP 2387/EIP 2384 and the Delay of Ethereum’s Difficulty Bomb | Continue reading


@blog.cotten.io | 4 years ago

Deploying the Libra Core Blockchain on Amazon EC2

Configuration and Installation of a Cloud-hosted Libra Testnet Node | Continue reading


@blog.cotten.io | 4 years ago

DeFi: Deposit Account Tutorial in Solidity

Writing a Simple Deposit Account Smart Contract in Solidity | Continue reading


@blog.cotten.io | 4 years ago

Wash Trading: How Crypto Exchanges Are Faking 67% of Trade Volume

The Blockchain Transparency Institute’s Stunning Report | Continue reading


@blog.cotten.io | 5 years ago

An Overview of Bitcoin Transaction Types and Methods of Laundering

Examples of Common Patterns in Analyzing Bitcoin Wallets | Continue reading


@blog.cotten.io | 5 years ago

Congress on Market Manipulation and Crypto Regulation

A Brief Summary of Two Bills Proposed by U.S. Representative Soto | Continue reading


@blog.cotten.io | 5 years ago

Another Bitcoin Price Crash Imminent?

Massive Drop in Difficulty and a Failure to Breakout | Continue reading


@blog.cotten.io | 5 years ago

A Very SLEEPy MySQL Attack

This article dissects a common MySQL attack vector used in the wild. SLEEP attacks are commonly used to to identify vulnerable MySQL… | Continue reading


@blog.cotten.io | 5 years ago

Hacking Node.js “May I Have This Repo?” – The Danger of Upstream Dependencies

The Unbelievable Danger of Upstream Dependencies | Continue reading


@blog.cotten.io | 5 years ago

Bitcoin Crashes Below Energy Cost

Mining Unprofitable. Markets in Upheaval. Ratios in Reverse. | Continue reading


@blog.cotten.io | 5 years ago

Bitcoin Cash Fork – SV is burning $1,500 an hour trying to keep up

Energy Cost Analysis Explores Long-term Viability | Continue reading


@blog.cotten.io | 5 years ago

Ghost Emails: Hacking Gmail's UX to Hide the Sender

Faking the Appearance of a System Message in Gmail | Continue reading


@blog.cotten.io | 5 years ago

Hacking Gmail’s UX with from Fields – Another Phishing Vector

An Unexpected Consequence of a Bad Header | Continue reading


@blog.cotten.io | 5 years ago

Bitcoin Money Laundering and Mueller’s 12 – A Blockchain Analysis

A Blockchain Analysis of the July 13th Mueller Indictment | Continue reading


@blog.cotten.io | 5 years ago