Avalanche Protocol Signature Exploit: Part Two
This series includes each report I sent to the Avalanche protocol team detailing a potent zero-day vulnerability in their AvalancheGo implementation that allows for the recovery of private keys from signatures formed by nodes & validators. This vulne...
librehash.xyz15 min read