Blockstream to Release Lightning Network Payment App

New app is called Paypercall and designed for new generation of micro-payment networks
26 March 2018   479

Within the Week of LApps, Blockstream introduced the fourth Lightning application, Paypercall. According to the developers, it is a welcome solution for a new generation of micro-payment networks, through which web developers will be able to request payment for specific API operations.

As examples the creators name automatically performed payments when sending SMS or image processing. Thus, with the help of Paypercall and Lightning technology, developers will be able to set up appropriate instant transactions.

As stated in the message, Node.js programmers can use Paypercall as an intermediate software that monitors the implementation of payments to the Lightning Charge server before approving the request for API use. Also, Paypercall can be used as a reverse proxy, which intercepts service requests until a payment is made.

Paypercall Code Example
Paypercall Code Example

For users, the process is very simple: if they want to use Lightning Charge in Paypercall, an invoice will automatically be created when the developer URL is opened. After it is paid, users can send a request for the use of the corresponding service.

Ethereum VM May Have Vulnerability

The vulnerability is reported by NettaLab Twitter account
12 November 2018   65

On November 9, a statement appeared in Netta Lab’s Twitter account that the organization discovered a vulnerability in the Ethereum virtual machine that allows to execute smart contracts endlessly without paying for gas online. The researchers also allegedly turned to the operator of the American database of vulnerabilities, where they registered the corresponding discovery.

Netta Labs discovered an Ethereum EVM vulnerability, which could be exploited by hackers. The vulnerability can cause smart contracts can be executed indefinitely without gas being paied.
 

Netta Lab's Twitter

At Netta Lab's request, Google demonstrates the site of the netto.io project, which specializes in auditing smart contracts under the Netta Lab brand, but the Twitter accounts of the projects do not match. Note that the profile that reported the vulnerability was registered in November.

Many users expressed doubts about the authenticity of the information that appeared, but then the creator of the NEO project Da Hongwei said that he spoke with the CEO of Netta Labs and asked the researchers to audit the NEO virtual machine.

Nevertheless, Vitalik Buterin wrote on Reddit that this is a vulnerability in the Python-implementation of the virtual machine, which was first reported on GitHub 9 days ago. This means that the main clients (go-ethereum; parity and cpp-ethereum) are not affected.