You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
This example generates a random secret key and ordinal value, creates a Pedersen commitment using secp256k1, generates a Bulletproof using secp256k1_bulletproofs, encodes the data as a hex string, adds it as an output to a Bitcoin transaction, and broadcasts it to the network. Note that this is a simplified example and should not be used without ad