Hack-a-Chain

493 posts

Hack-a-Chain banner
Hack-a-Chain

Hack-a-Chain

@hackachain

Infra and contracts for 7+ protocols, EVM and non-EVM. Indexers, explorers and analytics designed for scale and reliability with 24/7 support and monitoring.

Bergabung Mart 2022
615 Mengikuti3K Pengikut
Hack-a-Chain me-retweet
fauzii
fauzii@FYorandaa·
@hackachain @kadena_io Kadscan looks amazing! Finally a fast and clean explorer for Kadena
English
0
2
4
404
Hack-a-Chain me-retweet
@·
A new explorer is live for the Kadena ecosystem. Kadscan delivers a fast, clean and reliable experience, real-time tx details, portfolio tracking, and a developer-ready GraphQL API (Kadindexer) for instant blockchain data access. Explore now 👇 $KDA
English
0
9
33
856
@·
🌐 For the Kadena community: After 3 weeks of community testing and 30+ feedback items, we've shipped! This is just the beginning. Keep the feedback coming through the form on Kadscan.
English
1
0
11
252
Hack-a-Chain
Hack-a-Chain@hackachain·
What we've mastered along the way: • zkSNARKs in production environments • GraphQL indexers processing millions of queries • Non-EVM architectures at scale • Privacy-preserving protocols with compliance Real implementations. Not prototypes.
English
1
0
4
101
Hack-a-Chain
Hack-a-Chain@hackachain·
3 years building in the shadows. 7+ protocols. One vision. Hack-a-Chain started as smart contract auditors. Today, we build infrastructure layers that power blockchains. The journey taught us one thing: security and scalability aren't features, they're foundations.
English
2
1
7
277
Hack-a-Chain
Hack-a-Chain@hackachain·
RT @moic_digital: Web3 devs often seek off-chain solutions for scalability and efficiency. However, centralized platforms like AWS and Goo…
English
0
16
0
0
Hack-a-Chain
Hack-a-Chain@hackachain·
This special video from the #hack_a_pills series is split into two parts and logically explains when a system has privacy and when it does not. Technical definition of privacy - Part 1 It’s important to differ from the moral intentions of a system, e.g., a specific website should not disclose that you have an account there, from the technical feasibility of the system, e.g., anyone can try to create an account with your email and check if you already have one. A system is technically private whenever it’s not possible to extract information that should not be extracted, and vice-versa. Check out the complete video: youtube.com/watch?v=aaa7LT…
YouTube video
YouTube
English
0
4
9
1.1K
Hack-a-Chain
Hack-a-Chain@hackachain·
Join our friends from @blockful_io in Rio de Janeiro for one more great space for knowledge exchange!
English
1
1
4
596
Hack-a-Chain me-retweet
@·
What gets you the most excited about Opact Wallet? Is it the possibility of performing private transactions? The astonishing UI that our team has created to make it super easy to use? Or is it something else? We’re excited to hear from you, tell us in the comments!
 tweet media
English
4
5
23
914