Preamble The three cardinal rules and phases to performing an inflation attack on a protocol are: A way to get one key value to empty or almost empty A way to inflate another key value A way to exploit this resulting changes. "Daniel Von Fange" ...
0xffchain.hashnode.dev7 min read
No responses yet.