nabilech.com

Uncategorized

Why XOR Is a Terrible Way to Combine Hashes (And How It Cost Panoptic $4M in Risk)

There is a tempting idea in cryptographic design: take individual hash outputs and XOR them together. It is simple, fast, and incremental — if one input changes, you just XOR out the old hash and XOR in the new one. No need to recompute the whole thing. The problem is that XOR hashing is broken. […]

Why XOR Is a Terrible Way to Combine Hashes (And How It Cost Panoptic $4M in Risk) Read More »

Understanding Zero-Knowledge Proofs Through the Lens of P vs NP

1. Introduction — The Hidden Thread Between Math and Privacy If you’re reading this, chances are you’ve used encryption today — probably without realizing it. Every time you send a message, check your email, or make a blockchain transaction, your data is protected by math. But not just any math — it’s protected by problems

Understanding Zero-Knowledge Proofs Through the Lens of P vs NP Read More »

ResupplyFi Rekt: How a $4K Flash Loan Led to a $9.8M ERC-4626 Donation Attack

1. Introduction In June 2025, ResupplyFi — a lending protocol integrated with the Convex and Yearn ecosystems — suffered a devastating exploit that drained approximately $9.8 million in under 90 minutes. The attacker leveraged a classic ERC-4626 “donation attack” combined with a flawed vault implementation to manipulate the exchange rate of vault shares, turning a

ResupplyFi Rekt: How a $4K Flash Loan Led to a $9.8M ERC-4626 Donation Attack Read More »

Ethernaut – Puzzle Wallet

Deep Dive into Storage Collisions, Multicall Exploitation, and Proxy Vulnerabilities Introduction Ethernaut, created by OpenZeppelin, is more than just a collection of Solidity puzzles. It is a security playground designed to replicate real-world vulnerabilities often found in decentralized applications. Among these challenges, Puzzle Wallet stands out as one of the more advanced levels because it

Ethernaut – Puzzle Wallet Read More »