Search result of MUTE

Analyzing the X open-source recommendation algorithm: What type of content can we produce to capture greater audience interest?
Intermediate

Analyzing the X open-source recommendation algorithm: What type of content can we produce to capture greater audience interest?

X (formerly Twitter) has released the source code for its latest recommendation algorithm, offering a comprehensive look at the platform's content ranking logic and interaction weighting mechanisms for the first time. This article provides a technical breakdown of how likes lose value over time, how conversations are priced, and how negative feedback is penalized at the code level. It also outlines practical traffic optimization strategies for creators.
2026-01-21 09:12:25
DeBox: An Integrated Social Platform Based on DID
Beginner

DeBox: An Integrated Social Platform Based on DID

DeBox is a DID-based integrated social platform that combines on-chain and off-chain functionalities, aiming to create a "WeChat for Web3."
2024-04-10 10:47:23
 AScoin Wallet: Revolutionizing the Crypto Space with Unique Features and Enhanced Security
Beginner

AScoin Wallet: Revolutionizing the Crypto Space with Unique Features and Enhanced Security

This article introduces how the Web3 aggregation transaction multi-chain wallet AScoin Wallet breaks through the barriers for on-chain wallets to enter exchanges.
2024-03-01 07:11:26
Comprehensive Data Comparison: Who Will Be the Rising Star of the Layer 2 Race?
Advanced

Comprehensive Data Comparison: Who Will Be the Rising Star of the Layer 2 Race?

This article aims to help readers understand the landscape and characteristics of the Layer 2 competition through a comparison of on-chain data.
2024-01-22 21:54:42
Comprehensive comparison of on-chain data: Who is the future star of L2?
Beginner

Comprehensive comparison of on-chain data: Who is the future star of L2?

This paper compares a number of different L2 raceways in terms of several metrics.
2024-01-06 09:00:59
Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example
Beginner

Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example

On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, where over $1.5 billion in assets were stolen. This incident is similar to the attack on the Radiant Capital cross-chain lending protocol in October 2025, where attackers stole funds by controlling multi-signature private keys and exploiting contract vulnerabilities. Both incidents highlight the increasing complexity of hacker attacks and expose security vulnerabilities in the crypto industry. This article provides an in-depth analysis of the technical details of the Radiant incident, focusing on the abuse of malicious contracts and multi-signature wallets. The article concludes by emphasizing the urgent need to strengthen industry security measures to protect user assets.
2025-02-22 04:21:23
Learn Cryptocurrency & Blockchain

Your Gateway to Crypto World, Subscribe to Gate for a New Perspective

Learn Cryptocurrency & Blockchain