2023-1-9 19:17 |
Net number of attacks against DeFi protocol spiked by almost 30% compared to 2021 statistics origin »
2023-1-9 19:17 |
Net number of attacks against DeFi protocol spiked by almost 30% compared to 2021 statistics origin »
A protocol proposal from Antoine Riard seeks to mitigate Lightning Network channel jamming attacks with a Chaumian ecash token.
2022-12-28 04:00 | |
Although the decentralized lending protocol’s data is inherently on-chain, introducing Chainlink’s PoR would help mitigate the risk of attacks on the Aave protocol.
2022-12-23 22:03 | |
According to an on-chain analysis by security firm BlockSec, Ankr (ANKR/USD) and stablecoin issuer Helio have lost about $20 million in a series of connected attacks. The first attack targeted a liquid staking token product offered by Ankr while the second attack targeted the Helio Protocol.
2022-12-2 13:56 | |
Crypto hacks have become commonplace, with projects like Axie Infinity losing millions of dollars to such attacks. Hacks in 2022 alone have amounted to over $2 billion, and the year hasn’t ended yet.
2022-9-29 23:53 | |
BENQI, an algorithmic Liquidity Market protocol on Avalanche, has announced it will be integrating with Chainlink Price Feeds to increase security against flash loan attacks. BENQI protocol has highly reliable, and tamper-proof data feeds on all the assets offered in its lending and borrowing markets.
2021-5-19 21:02 | |
Avalanche-based algorithmic money market protocol BENQI is integrating Chainlink Price Feeds to ensure protocol security against the infamous flash loan attacks. BENQI Integrates Chainlink Oracles Today, Avalanche’s C-Chain-based algorithmic money-making protocol BENQI announced it is integrating Chainlink Price Feeds to safeguard the protocol against flash loan assaults.
2021-5-19 16:09 | |
Coinspeaker BENQI Integrates Chainlink Price Feeds on Avalanche Mainnet to Secure Lending Protocol BENQI, an algorithmic money market protocol built on Avalanche’s C-Chain, is integrating Chainlink Price Feeds to ensure security of its protocol and resilience against flash loan attacks.
2021-5-18 15:47 | |
Attacks on major cryptocurrency exchanges are regrettably common. Over $200 million dollars have been lost to hacks and exploits on services such as KuCoin and, more recently, Origin Protocol. Although these events are an inescapable risk, there are new services that offer protection against loss of funds for these scenarios. Bridge Mutual is a decentralized […]
2021-1-30 12:39 | |
Global blockchain research and development company IOHK has announced that it is relaunching the ‘Mantis’ client, which was originally developed for Ethereum Classic (ETC) by IOHK in 2017. The decision to relaunch follows the recent 51% attacks on Ethereum Classic, which have exposed vulnerabilities in the protocol, making it clear that ETC is in need […] CryptoNinjas » IOHK relaunches Mantis to offer Ethereum Classic community a more secure future
2020-12-10 07:35 | |
Several decentralized finance (DeFi) protocols have fallen victim to economic exploits since the start of this year. These have included large-scale attacks on the bZx project, the $25 million exploit on dForce’s lending protocol LendfMe.
2020-10-26 14:33 | |
After multiple 51% attacks, Ethereum Classic (ETC) developers working towards making the project’s network more resistant to blockchain reorganization (reorg) exploits. Proof-of-Work (PoW) blockchains with significantly smaller network effect remain vulnerable to malicious reorg attacks.
2020-9-19 20:53 | |
A new cybersecurity report said privacy protocol Monero was used in most of the cryptojacking attacks traced this year. The post Security report finds Monero (XMR) leads in “cryptojacking” exploits appeared first on CryptoSlate.
2020-9-15 18:00 | |
A new trojan called Krypto Cibule uses infested computers’ power to mine cryptocurrency, steal crypto wallet files, and redirect incoming digital assets to a hacker address. The malware rides on the Tor network and the Bittorrent protocol to perform attacks, according to an extensive report by cybersecurity company, ESET.
2020-9-4 12:30 | |
After suffering two 51% attacks in a week, the ETC community is reeling. Vitalik Buterin suggested that ETC change its consensus algorithm to Proof of Stake. But is the conservative “Code Is Law” protocol ready for a change? On July 31, Ethereum Classic was hit by the first of two 51% attacks.
2020-8-7 09:38 | |
Ethereum Classic (ETC), the fork or version of the Ethereum protocol that didn’t freeze the funds of the infamous DAO hack, has been under the spotlight over the past week. The post Why isn’t Ethereum Classic worth $0? Macro investor asks after 51% attacks appeared first on CryptoSlate.
2020-8-7 09:00 | |
With so much innovation going on in the space, DeFi has become a big rising star over the years. In a more recent milestone, DeFi apps on the Ethereum network hit an all-time high of $1.21 billion on The post DeFi attacks reignite centralization dilemma, debates on protocol reliability appeared first on AMBCrypto.
2020-2-26 22:30 | |
bZx, a DeFi lending protocol, was hit with a series of exploits. The attacks resulted in the loss of 3,581 ETH worth nearly $1 million. A series of unfortunate events On Feb. 14, the bZx team was alerted about a suspicious transaction that allowed the perpetrator to net a whopping $300,000 in profits.
2020-2-19 18:07 | |
Special thanks to Justin Drake and Jinglan Wang for feedback In 2014, I made a post and a presentation with a list of hard problems in math, computer science and economics that I thought were important for the cryptocurrency space (as I then called it) to be able to reach maturity.
2019-11-25 04:03 | |
BIP 324, proposed by Jonas Schnelli, is designed to protect Bitcoin peers against man-in-the-middle attacks using an action called a “handshake” to share keys more privately. The post BIP 324: A Message Transport Protocol That Could Protect Bitcoin Peers appeared first on Bitcoin Magazine.
2019-11-14 20:38 | |
Ethereum founder and programmer Vitalik Buterin thinks the Proof-of-Stake protocol will make the Ethereum blockchain safer than Bitcoin in the next few years according to a press release dated October 9, 2019, from Decrypt.
2019-10-10 13:00 | |
Recommended pre-reading: https://ethresear. ch/t/minimal-anti-collusion-infrastructure/5413 Alice slowly walks down the old, dusty stairs of the building into the basement. She thinks wistfully of the old days, when quadratic-voting in the World Collective Market was a much simpler process of linking her public key to a twitter account and opening up metamask to start firing off votes.
2019-10-2 04:03 | |
Pieter Wuille, one of the most active Bitcoin core developers, has proposed a new BIP protocol called Erlay which would help the network grow further and secure it against numerous attacks. Bitcoin works on the principle of DLT, which is why the security of the network depends on the connectivity among these nodes.
2019-9-27 23:30 | |
Special thanks to the Plasma Group team for review and feedback Current approaches to layer 2 scaling - basically, Plasma and state channels - are increasingly moving from theory to practice, but at the same time it is becoming easier to see the inherent challenges in treating these techniques as a fully fledged scaling solution for Ethereum.
2019-9-2 04:03 | |
Cloudflare today announced the launch of its latest network security product, called Magic Transit. This service allows organizations to send their entire network traffic through Cloudflare’s secure and performance-optimized network, offering protections against DDoS attacks, while simultaneously boosting speeds.
2019-8-13 15:59 | |
Ryan Taylor, CEO of Dash Core Group, was in the news last week after he claimed that the implementation of Chainlock protocol would make the network immune to 51% attacks and a chain re-org. Dash is in the news yet again, for their soon to be released Decentralized API [DAPI].
2019-7-24 23:30 | |
Just two months ago, ILCoin introduced a unique Command Chain Protocol (C2P) consensus to the crypto-community, which is resistant to quantum attacks and 51% attacks. This technology has been recognized by tech industry experts and was awarded a cybersecurity certificate by the Palo Alto Networks Partner.
2019-7-17 16:06 | |
Dash was recently in the news for the implementation of Chainlock, a protocol which helps the Dash network become immune to 51% attacks or a chain re-org. Ryan Taylor, Dash CEO, was recently featured in an interview where he spoke extensively on Chainlock, New InstantSend and more.
2019-7-14 00:30 | |
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions.
2019-6-14 04:03 | |
IOTA Foundation, the main pillar behind the development of IOTA, recently unveiled the blueprint for Coordicide, the killer of Coordinator, which is expected to launch in the coming months. A Coordinator [Coo] is a centralized protocol that controls the transactions and security on the IOTA blockchain, with its key function being protecting Tangle against attacks.
2019-5-30 15:51 | |
Coinspeaker Command Chain Protocol: PoW with Bulletproof Technology Under the HoodWhile blockchain industry still strongly needs a protocol that can withstand double spending, rollbacks, and 51 percent attacks, ILCOIN project launched the first quantum resistant PoW protocol, which seeks to tap into the weaknesses of blockchain tech.
2019-4-29 09:53 | |
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting.
2019-4-27 22:07 | |
A verifiable delay function, or a VDF, is a relatively new concept, helping to defend a system against manipulation or attacks as a result of generating somewhat random values. This type of solution can be implemented in many different use cases, including the selection of a lottery winner on the blockchain, considering that VDFs could […]
2019-4-23 01:36 | |
Over the years, Bitcoin has gained a reputation for having a “toxic” community of users around it. This accusation is mostly thrown at Bitcoin by proponents of altcoins and those who have supported various Bitcoin hard fork attempts in the past.
2019-4-5 16:23 | |
After a year on its testnet, the VeriBlock blockchain went live yesterday on the Bitcoin mainnet, allowing exchanges, wallet providers, merchants and other crypto businesses to leverage Bitcoin’s robust blockchain security.
2019-3-27 19:35 | |
Monero successfully completed a scheduled protocol upgrade (hard fork) on Mar. 9th. The upgrade includes tweaks to the PoW algorithm for better ASIC-resistance, changes to mitigate big bang attacks, and increased transaction homogeneity to further improve privacy.
2019-3-10 00:53 | |
Fantasy fans may remember Arwen, the character from the “Lord of the Rings” who guides the main characters through a series of dangerous situations. The Arwen protocol intends to do the same, only for cryptocurrency trading.
2019-3-4 20:14 | |
One problem that concerns many is the centralization of mining within the Bitcoin ecosystem. Fortunately, there are talented developers working to solve this problem and Matt Corallo, full-time Bitcoin developer at Chaincode Labs, is one of them.
2019-1-26 23:50 | |
To protect devices from damage through incompatible chargers and malware attacks, USB Implementers Forum (USB-IF) – the organization that supports and promotes changes for USB standards – has introduced an authentication program for USB-C connections.
2019-1-3 10:16 | |
Yet another tool is being added to Bitcoin’s growing number of privacy solutions. Thought up at a brainstorming event attended by Bitcoin developers and privacy researchers last summer, Pay to Endpoint (P2EP) is a relatively new trick that utilizes the well-known CoinJoin mixing technique to make blockchain analysis much harder.
2019-1-1 19:31 | |
Minisketch is a new solution that’s trying to solve an old problem. Spearheaded by Blockstream co-founder Pieter Wuille, Bitcoin Core contributor and fellow Blockstream co-founder Gregory Maxwell, and Blockstream software engineer Gleb Naumenko, the open-source initiative is designed to achieve set reconciliation between the mempools of each full node.
2018-12-18 18:48 | |
The Dash, which is a payment network will soon be introducing a unique new network upgrade, one that will be able to eliminate the threat of having about 51% attacks that happen on the protocol. With the ChainLocks platform, it is able to enable the transactions to be easily secured and confirmed once the block […]
2018-12-3 22:03 | |
Payments network Dash (DASH) may soon implement a new, unique network upgrade that will reportedly “eliminate” the threat of a 51% attack from the protocol, once fully implemented ChainLocks enables transactions to be confirmed and secured as soon as the block has been processed, rather than waiting for six other blocks to be signed first.
2018-12-3 00:06 | |
On Nov. 20, the Bitcoin Cash developer Awemany announced the first code proposal for a concept called Zero-Confirmation Forfeits (ZCF), a protocol that adds a layer of security to zero-confirmation transactions.
2018-11-22 22:50 | |
Charles Hoskinson is best known today as a co-founder of both Ethereum and IOHK, where he leads the research, design and development of Cardano. But before these projects, there was Bitcoin.
2018-11-20 23:08 | |
Bitcoin Cash, the “big block” project that forked away from the Bitcoin blockchain in August 2017, “hard forked” (split) into two different coins: “Bitcoin Cash ABC” (BCH ABC) and “Bitcoin Cash SV” (BCH SV).
2018-11-17 02:13 | |
Listen Here – https://soundcloud. com/cryptodaily/how-monero-are-improving-human-rights-with-xmr Monero is considered to be the privacy coin, the currency of choice for absolute privacy. Now, privacy doesn’t necessarily mean security and we should remember that 2018 has seen a tonne of ‘Monero mining’ hacks, calling into question some of the projects integrity.
2018-10-12 17:00 | |
For well over a year, versions of Bitcoin Core — Bitcoin’s leading software implementation — contained a severe software bug. The bug was fixed with Bitcoin Core 0.
2018-9-22 21:22 | |
Ammeris is creating a platform that is designed to host frictionless interconnectivity. The Platform is now onboarding and incubating businesses and organizations seeking to use a sustainable and long-term oriented network for their applications that is easy and cost efficient to use –creating the beginning steps of a global decentralized ecosystem.
2018-9-6 05:33 | |
Algorand is a new cryptocurrency that confirms transactions with latency on the order of a minute while scaling to many users. Algorand ensures that users never have divergent views of confirmed transactions, even if some of the users are malicious and the network is temporarily partitioned.
2018-8-7 02:57 | |