Crypto Wallet Security RankingAfter years of research and months of rigorous testing, Coinspect is proud to present the Wallet Security Ranking — a comprehensive…Nov 8Nov 8
Tari base layer security reviewCoinspect published an in-depth security report for Tari, uncovering 50 issues.Feb 20Feb 20
A Safe dApp Ecosystem: Our VisionPhishing and compromised dApps front-ends pose significant risks, not only to individual users but also to the broader adoption of Web3…Dec 8, 20231Dec 8, 20231
A UI Flaw in Top Crypto WalletsCoinspect research team discovered a vulnerability in over 27 software wallets which could allow malicious websites to deceive users into…Aug 29, 2023Aug 29, 2023
Time-locked RecoveryIn crypto, recovery, and backup strategies are as crucial as the security measures safeguarding the wallets. So instead of a system where…May 17, 2023May 17, 2023
A Challenge in Verifying Hardware Wallet SecurityA particularly insidious security threat: the impossibility to confirm if a hardware wallet is gradually leaking our secret keys.May 16, 2023May 16, 2023
SNaP Attack: Cracking Ethereum’s Synchronizing Node Random GeneratorMassimiliano Taverna and Kenneth G. Paterson published "Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Node", a paper…May 15, 2023May 15, 2023
Addressing Rumors and Recommendations Following the MyAlgo Wallet HackA high-impact hack recently targeted MyAlgo, a web-based Algorand wallet, affecting thousands of users. Our team at Coinspect has…Mar 18, 2023Mar 18, 2023
Dissecting Ethereum delegated staking from a security perspective — Part 2Welcome to our second article on Security Considerations for Ethereum Delegated Proof of Stake (DPoS) platforms. As we explored previously…Feb 14, 2023Feb 14, 2023
Learn EVM Attacks releaseWe at Coinspect are excited to announce the release of our new code repository, learn-evm-attacks! This repository is an educational…Dec 12, 20221Dec 12, 20221