You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I've learned a lot thanks to your curated list of challenges!
After doing a lot of challenges, I finally decided to create one myself. I put a lot of thought into it, and I think it may interest other hackers/security researchers. A while ago, I posted it on reddit on r/ethdev, but, judging by the very low number of visitors (3), that's not the right place for this. Unfortunately, I don't know where else to post it.
I think it's somewhat hard, but I can't be a good judge of this. If you want, I can explain (very briefly) how it works. That will spoil it, but that's still better than having it ignored for lack of time/interest :)
Thank you for reading!
The text was updated successfully, but these errors were encountered:
Hi, I've learned a lot thanks to your curated list of challenges!
After doing a lot of challenges, I finally decided to create one myself. I put a lot of thought into it, and I think it may interest other hackers/security researchers. A while ago, I posted it on reddit on r/ethdev, but, judging by the very low number of visitors (3), that's not the right place for this. Unfortunately, I don't know where else to post it.
Here's my challenge: https://github.com/mtomassoli/MyChallenges
I think it's somewhat hard, but I can't be a good judge of this. If you want, I can explain (very briefly) how it works. That will spoil it, but that's still better than having it ignored for lack of time/interest :)
Thank you for reading!
The text was updated successfully, but these errors were encountered: