this post was submitted on 14 Jun 2023
6 points (100.0% liked)
cryptocurrency
2630 readers
3 users here now
The largest cryptocurrency community on the Fediverse!
Lemmy community dedicated to cryptocurrency news, technicals, education, memes and so more!
💬 Chat on Community Improvements and Development
Community Knowledge Base:
Be nice, have fun.
Community rules:
- No Spam
- No ads
- No aggressive coin promotion or attacks on others
- No ICOs / IEOs / STOs / token (pre)sales / scam schemes promotion
- No trading/buying crypto discussions
- No promotion of trading groups, courses, signal groups, or other trade groups
- No pumping and shilling
- No casinos, giveaways, faucets, begging
- No price speculation posts
- No trolling
General lemmy.ml instance rules applicable here too.
Ugly brother of this community: bωockchain
For a community devoted to cryptography itself, visit c/cryptography
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The formula will return a specific result of uint256 type which will be used in constructor on deployment, right? 😉
Yeah, this way you don't know what the number is until you actually figure out the vulnerability.