Ifpaytt - New LApp by Blockstream Announced

Last applocation within the "Week of LApps" presented
28 March 2018   435

Blockstream introduced the last application within the "Week of LApps" - Ifpaytt (If Pay Then That). Created on the basis of the IFTTT infrastructure (If This Then That), it is declared as a "companion" software for Paypercall, which allows you to configure a micropayment system without deep knowledge of programming.

It is noted that while Papercall is designed for professional Node.js developers, Ifpaytt allows to take advantage of the dynamic system of micropayments for not a pro coder.

Based on IFTTT, Ifpaytt uses the Lightning Charge and Paypercall functionality, allowing to create applets using combinations of triggers and actions. Payment of an invoice in the Lightning Network in this case becomes a trigger, and when it is triggered - a pre-programmed action is performed. The user just needs to create an IFTTT applet that connects them together. Detailed instructions can be found in the corresponding repository on GitHub.

From the client's point of view, the process will look exactly the same as when using Paypercall: when you navigate to the seller's URL, they will be provided with an account after payment which will give access to the service.

Ethereum VM May Have Vulnerability

The vulnerability is reported by NettaLab Twitter account
12 November 2018   65

On November 9, a statement appeared in Netta Lab’s Twitter account that the organization discovered a vulnerability in the Ethereum virtual machine that allows to execute smart contracts endlessly without paying for gas online. The researchers also allegedly turned to the operator of the American database of vulnerabilities, where they registered the corresponding discovery.

Netta Labs discovered an Ethereum EVM vulnerability, which could be exploited by hackers. The vulnerability can cause smart contracts can be executed indefinitely without gas being paied.

Netta Lab's Twitter

At Netta Lab's request, Google demonstrates the site of the netto.io project, which specializes in auditing smart contracts under the Netta Lab brand, but the Twitter accounts of the projects do not match. Note that the profile that reported the vulnerability was registered in November.

Many users expressed doubts about the authenticity of the information that appeared, but then the creator of the NEO project Da Hongwei said that he spoke with the CEO of Netta Labs and asked the researchers to audit the NEO virtual machine.

Nevertheless, Vitalik Buterin wrote on Reddit that this is a vulnerability in the Python-implementation of the virtual machine, which was first reported on GitHub 9 days ago. This means that the main clients (go-ethereum; parity and cpp-ethereum) are not affected.