2022-9-20 11:07 |
However, the exploit took place on a contract and does not affect the main Ethereum PoW network itself. origin »
2022-9-20 11:07 |
However, the exploit took place on a contract and does not affect the main Ethereum PoW network itself. origin »
The Zcoin team discovered a vulnerability in the cryptography of the Zerocoin protocol that allows an attacker to forge zero-knowledge proofs and create coins out of thin air. Coins using the protocol such as Veil are vulnerable to attack until Zerocoin is disabled.
2019-4-29 22:01 | |
Major darknet markets come and go in eras, so it seems, and the current one may be ending. Two of the biggest digital black markets seem to be disappearing, both at the same time.
2019-4-27 21:17 | |
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server.
2019-1-4 21:11 | |
This rather long meme, which has been circulating lately, makes fun of the views of Bitcoin supporters by listing commonly made statements and contrasting them with contradicting statements or developments.
2018-10-4 22:27 | |
Monero has officially released its Malware Response Workgroup website yesterday. In an effort to help protect Monero’s community, the website aims to provide resources to educate about the types of malware that may take advantage of users.
2018-9-29 23:18 | |
For well over a year, versions of Bitcoin Core — Bitcoin’s leading software implementation — contained a severe software bug. The bug was fixed with Bitcoin Core 0.
2018-9-22 21:22 | |
What is BitcoinHack? This is another Bitcoin scam, promising endless supplies of free cryptocurrency. The promise is that new users will make a minimum of $1261 weeks a year. You can exploit a supposed flaw in the system that gives out free profit.
2018-7-29 11:20 | |
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers.
2018-7-18 23:18 | |