Dan FinIay (@danfinlay) 's Twitter Profile
Dan FinIay

@danfinlay

Purposeful trust maximalist. Building a better web @metamask. warpcast.com/danfinlay danfinlay on Github, Keybase, … 🦋danfinlay.com

ID: 14285074

linkhttp://danfinlay.com calendar_today02-04-2008 16:53:14

21,21K Tweet

31,31K Followers

3,3K Following

McOso.eth 🐊 (@mcoso_) 's Twitter Profile Photo

I spoke yesterday at EthCC - Ethereum Community Conference about our next-gen permission system By leveraging 7702+7710+7715, we empower users to express exactly what they want to do, on their terms! TVU > TVL #23127 youtube.com/live/JOUbtpgdA…

Simon Willison (@simonw) 's Twitter Profile Photo

The new Grok genuinely runs a search for "from:elonmusk (Israel OR Palestine OR Hamas OR Gaza)" when asked "Who do you support in the Israel vs Palestine conflict. One word answer only."

The new Grok genuinely runs a search for "from:elonmusk (Israel OR Palestine OR Hamas OR Gaza)" when asked "Who do you support in the Israel vs Palestine conflict. One word answer only."
Francesco Andreoli | andreolf.ethᵍᵐ (@francescoswiss) 's Twitter Profile Photo

Under the Berlin sun a couple of weeks ago, Tomasz K. Stańczak and I pulled back the curtain on what’s really next: – ZK & account abstraction breakthroughs – Seamless multi‑chain UX – Fusaka’s final sprint – EIP‑7702 wallet magic

Dan FinIay (@danfinlay) 's Twitter Profile Photo

I used to have to wait for a new video by The Avalanches for something this nuts. Now this is just the song of today from Jon.

Ayush (@ayushbherwani) 's Twitter Profile Photo

Introducing our new series #CaveatEnforcersOfTheWeek! Every week, we’ll spotlight a different Caveat Enforcer, breaking down how it works, exploring real world use cases, and helping you understand why it matters. Watch the delegations explainer video to get up to speed 👇

Push Chain (@pushchain) 's Twitter Profile Photo

Future SEC Tech Stack! Honored to see SEC Commissioner Hester Peirce recognize innovations that comes with cutting edge tech... and even more exciting to see Push getting the spotlight in the discussion. Special thanks Paul Barron Network & PaulBarron for the feature.

zak.eth (@0xzak) 's Twitter Profile Photo

SECURITY THREAD: Your .env file WILL get you drained (here's how to not be next) 🧵 👇 Private keys in .env files will get you rekt. It's not if, but when. You're one extension away from $0. The time between my PK leak to drain: 27 minutes.

Francesco Andreoli | andreolf.ethᵍᵐ (@francescoswiss) 's Twitter Profile Photo

Yesterday, the ecosystem was hit by a supply chain attack targeting the popular JavaScript library polyfillio. Attackers injected malicious code into the package, which could exfiltrate user data or redirect traffic when imported by unsuspecting projects. We want to reassure 🦊

Yesterday, the ecosystem was hit by a supply chain attack targeting the popular JavaScript library polyfillio. Attackers injected malicious code into the package, which could exfiltrate user data or redirect traffic when imported by unsuspecting projects.

We want to reassure 🦊
Dan FinIay (@danfinlay) 's Twitter Profile Photo

This could have been much worse, for all the projects not using Lava Moat. This time: the attacker was embarrassed. Next time: Devs who didn’t adopt this free security tool and their users could all be rekt. github.com/LavaMoat/LavaM…

Stephen Wolfram (@stephen_wolfram) 's Twitter Profile Photo

If you do functional programming (like in Wolfram Language) you've probably used lots of pure functions, or lambdas. But what are lambdas like in the wild? Things I'm doing in CS, bio and ML converged to make me curious to find out... And as seems to happen whenever I go

If you do functional programming (like in Wolfram Language) you've probably used lots of pure functions, or lambdas.  But what are lambdas like in the wild?  Things I'm doing in CS, bio and ML converged to make me curious to find out...  And as seems to happen whenever I go