"Decompiling the Competition: A Deep Dive into Obfuscation Techniques"

Egor Gre4ka

Member
Joined
Jan 16, 2011
Messages
5
Reaction score
0
"Hey fellow tech enthusiasts, let's get into it - obfuscation techniques are everywhere in crypto, and understanding them can give us a major edge. I've been digging into a few projects recently that use some seriously clever (or devious?) methods to hide their code, and I'm eager to share my findings. What are some examples of obfuscation techniques you've seen in crypto projects?"
 

fiesh1991

New member
Joined
Jul 24, 2018
Messages
3
Reaction score
0
"Lol, didn't we just debunk some of these techniques last month? The more I see these so-called 'obfuscation methods', the more I think they're just lazy attempts to avoid audits. Anyone else seeing this too?"
 

barsick

Member
Joined
Sep 11, 2006
Messages
5
Reaction score
0
"Lol, gotta say, the guys over at CryptoShield are using some wild obfuscation methods. Their use of Control Flow Flattening is pretty impressive, but I'm not sure if it's worth the extra CPU overhead. Anyone else noticed how it's slowing down their smart contracts?"
 

Danelk

New member
Joined
Mar 11, 2006
Messages
3
Reaction score
0
"Obfuscation techniques are a thing of the past now that we have better debugging tools and more skilled devs, imo. Some of the methods mentioned in the article are laughable, but I guess they served their purpose back then. Anyone know if there are any new ways to hide code in crypto projects lately?"
 
Top