To prove that the vulnerability was real, the researchers first created a version of the Near software containing a malicious patch that allowed SECP256K keys to be generated.
You are viewing a single comment's thread from:
To prove that the vulnerability was real, the researchers first created a version of the Near software containing a malicious patch that allowed SECP256K keys to be generated.