Was encouraged by Tulli to post some of my original work here today for portfolio day. Besides GG20s, I'm also developing a cyberpunk story about a rookie cyborg boxer in an alternate 2001 Los Angeles in the style of late-90s anime.
I also have a side project, developing a video game idea on exploring the Pacific ocean and speculative marine sciences.
Also some posters I've done, including a piece I made for The Lovers.
Years ago, I was part of the Pokémon World Online team, known among staff as Bishon, unknown among players. Although I left that team for specific reasons, I'm still in good terms with some of them (mostly the new bloods)
Some days ago, Sushikraver (a PWO Community Guide who knows about the Booster Pack Simulator) asked me if I could help him set a similar website, to be a different way for players to discover swarm contents. I agreed to help, using the Booster Pack Simulator codes as a base for it.
Since the Booster Pack Simulator was something a living God (a friend of mine who's very skilled) did for me, and I have little-to-no skill in coding, that was tedious. There were several issues (tons of commits to fix the shit I just added), and the website is only optimized for regular-sized smartphones (needs 180% zoom on desktop, and top images are cropped), but it works well.
Along with the coding part (and writing a readme clear enough for Sushikraver to be able to edit the website without any issue), I also made a booster pack (picture above)
The template is from ShiningBill on DeviantArt, while the pattern is a mix of the Kyogre and Groudon's patterns from Pokémon Shirts
The illustrations are from:
- Dragonite (151 149)
- Team Magma's Claydol (Double Crisis 11)
- Team Aqua's Spheal (Double Crisis 3)
- Latias (Crown Zenith GG20)
I plan on updating the website, mostly to make it more desktop/smartphone friendly (but I'll need help from the living God), but over than that Sushikraver will be the one editing it to his needs.
Link to the forum announcement
Link to the Swarm Reveal website
Fireblocks Discloses Bitforge Vulnerabilities Affecting Dozens of Wallet Providers
Bitforge Vulnerabilities Disclosed
Fireblocks, a cryptocurrency assets security and consulting company, has publicly disclosed Bitforge is facing a set of wallet vulnerabilities potentially affecting millions of customers. While the Fireblocks team discovered these issues back in May, it just announced their existence in a presentation titled “Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That Undermine Leading Crypto Wallets” as part of the Blackhat 2023 conference.
These vulnerabilities attack the Multi-Party Computation (MPC) algorithms of several vendors. The first vulnerability is related to GG18 and GG20, two protocols qualified by Fireblocks as “pioneering for the MPC wallet industry” and “widely adopted by companies in the space.”
The exploit allows criminals to exfiltrate the private key and take control of the cryptocurrency in the attacked wallet. Fireblocks also presented a proof-of-concept for this attack.
Similarly, the second vulnerability deals with Lindell17, a signing protocol. Fireblocks states this exploit “originates from Lindell17 implementations deviating from the specification of the academic paper and ignoring or mishandling aborts in case of failed signatures.”
This vulnerability was discovered in the Zengo wallet and later confirmed to work against Coinbase Wallet as a Service (WAAS), as in open-source protocol implementations. Zengo and Coinbase have already patched their wallets to deal with this exploit.
Jeff Lunglhofer, Chief Information Security Officer at Coinbase, thanked Fireblocks for the timely disclosure, telling Bleeping Computer that “while Coinbase customers and funds were never at risk, maintaining a fully trustless cryptographic model is an important aspect of any MPC implementation.”
Vulnerability Checker
Due to the number of wallets potentially affected by this set of vulnerabilities, Fireblocks has built a utility to allow wallet providers and users to check if their wallets can be exploited using these vulnerabilities.
At the time, only Coinbase and Zengo are listed as secure against the Lindell17 exploit. Fireblocks explained that not all wallet providers are shown because “it’s part of the DNA of the industry to work together to be stronger out of the public eye rather than calling companies out publicly and harming their credibility.”
What do you think about the Bitforge set of wallet exploits? Tell us in the comments section below.
Read the full article