2019-5-30 20:48 |
A 51% attack is one of the worst things that can happen to a blockchain, as it undermines its… The post Bitcoin Cash 51% Attack From Just 2 Major Miners Happened Under Everyone’s Noses appeared first on Invest In Blockchain. origin »
2019-5-30 20:48 |
A 51% attack is one of the worst things that can happen to a blockchain, as it undermines its… The post Bitcoin Cash 51% Attack From Just 2 Major Miners Happened Under Everyone’s Noses appeared first on Invest In Blockchain. origin »
It is very common in the digital asset sphere to have cases of different types of scams regularly. The latest of such crypto scams that has got the attention of everyone in the cryptocurrency community is a social media attack on the Jibrel Wallet.
2019-5-9 00:08 | |
By CCN: Police in the tiny town of Norton, Kansas posted a bulletin to their website yesterday morning urging followers not to fall for a bizarre Bitcoin sextortion scam. Spear-Phishing Attack Targets Individuals With Secret Porn Habits In this version of a classic spear-phishing attack, the scammer sends an e-mail to the victim and tells them they have a recording of the victim pleasuring him or herself – complete with the content they were watching at the time.
2019-4-23 19:30 | |
Over the years, Bitcoin has gained a reputation for having a “toxic” community of users around it. This accusation is mostly thrown at Bitcoin by proponents of altcoins and those who have supported various Bitcoin hard fork attempts in the past.
2019-4-5 16:23 | |
Special thanks to Glen Weyl, Phil Daian and Jinglan Wang for review Over the last few years there has been an increasing interest in using deliberately engineered economic incentives and mechanism design to align behavior of participants in various contexts.
2019-4-5 04:03 | |
Boston public defenders suffered a ransomware attack some weeks back but have chosen not to send the bitcoin demanded by the attacker. Instead, they decided to use back-ups to restore services. The Committee oversees public defenders in Boston.
2019-3-15 20:33 | |
There are two primary reasons why storing your private crypto keys in the cloud is a bad idea. First, your cloud provider represents a centralized honeypot that could experience a security breach, allowing cyber criminals to access your data.
2019-2-19 00:19 | |
Despite the devastating 51 percent attack on Vertcoin, ASIC-resistance is a goal worth fighting for.
2018-12-10 13:00 | |
Bitcoin Cash, the “big block” project that forked away from the Bitcoin blockchain in August 2017, “hard forked” (split) into two different coins: “Bitcoin Cash ABC” (BCH ABC) and “Bitcoin Cash SV” (BCH SV).
2018-11-17 02:13 | |
A bit of a debate has revved up about bitcoin's "time warp attack" and whether it's an exploit or an unintended advantage.
2018-10-13 11:30 | |
For well over a year, versions of Bitcoin Core — Bitcoin’s leading software implementation — contained a severe software bug. The bug was fixed with Bitcoin Core 0.
2018-9-22 21:22 | |
Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type).
2018-8-9 04:03 | |
On July 10, 2018, news broke that cryptocurrency wallet and decentralized exchange Bancor was hit with a hack. A wallet the Bancor team used to update the protocol’s smart contracts was infiltrated, and the $23.
2018-8-3 19:24 | |
Even though we are well into our second decade of widespread internet use, the term ‘cyber attack’ is still a relatively new and daunting one for many people. Many individuals and small businesses entrust their cybersecurity to off-the-shelf antivirus softwares, which can effective but certainly aren’t foolproof. When it comes to preventing cyber attacks, everyone […]
2018-7-27 16:04 | |
Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way.
2018-7-21 23:03 | |
The following is a diagram from a slide that I made in one of my presentations at Cornell this week: </img> If there was one diagram that could capture the core principle of Casper’s incentivization philosophy, this might be it.
2018-7-21 23:03 | |