Результатов: 144

Ethereum Developers Wants ASIC Mining Hardware Removed from the Ethereum platform

Martin Holst Swende who joined the nonprofit Ethereum Foundation in 2016 as the lead security to ensure that any code change within the second largest blockchain platform for the development of decentralized applications do not halt operations in the blockchain had voiced his opinion against the use of ASIC miners in Ethereum mine. дальше »

2018-9-29 19:45


These few lines of CSS code will crash your iPhone

A security researcher has found out that due to a vulnerability in WebKit (a rendering engine used by Safari browser), it takes only a few lines of CSS code to crash an iPhone or an iPad. The code itself is not too complex and uses multiple nested elements like <div> tags inside a CSS effect called backdrop-filter, used for color shifting behind the element. дальше »

2018-9-17 14:33


Citigroup’s New Digital Asset Receipt (DAR) as a Bitcoin Security Product Looks to Crack Crypto Code for Investors

Citigroup Insider Shares Citi is Working on a Bitcoin ‘Security’ Product, Aims to Be the Leading Company Citigroup is working in order to launch a new Bitcoin trading product to the market. The main intention is to be ahead of its Tier I banking rivals around the world. The information has been released by some […] дальше »

2018-9-10 02:31


Фото:

Cryptocurrency Wallet SafeWallet Introduces Alternative to Private Keys and Mnemonic Phrases

In a bid to entirely eradicate the issues of loss, theft and other challenges that comes with crypto wallet private keys and mnemonic phrases, SafeWallet has introduced a new system of wallet security that enables users recover their digital currencies with just their QR code based user IDs and preset security questions, according to a press release  by the firm. дальше »

2018-7-30 17:00


Фото:

QR Code Encrypted Private Keys to be Replaced by Crypto Wallet

Decentralized cryptocurrency wallet SafeWallet is launching a new QR code-based user identification system to replace mnemonic phrases and private keys, the firm announced Friday. The app, operated by China-based Cheetah Mobile, will use a two-tier security system to grant users access to their holdings, according to a press release. The first stage will have users scan дальше »

2018-7-27 20:25


Фото:

Etherscan rushes to plug vulnerabilities following strange hacking attempts overnight

Etherscan, the most widely used Ethereum blockchain explorer, has quickly patched security vulnerabilities overnight as hackers exploited certain parts of its service. Hackers successfully manipulated the Disqus API – a third-party service used by Etherscan that allows for comments to be left on Ethereum wallet addresses. дальше »

2018-7-24 13:00


Фото:

Governance, Part 2: Plutocracy Is Still Bad

Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way. дальше »

2018-7-21 23:03


Фото:

Op Ed: Addressing the Threat of Cryptomining Malware

One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »

2018-7-18 23:18


Exchange Integration Error Was True Cause of Tether Code ‘Flaw’

According the latest statements from both blockchain security firm Slow Mist and Tether, the issue is actually down to an exchange integration flaw. On Thursday, Slow Mist claimed in a WeChat post that when an exchange is conducting a transaction with USDT, the exchange needs to verify that the transactions details are “true. ” If this is not дальше »

2018-6-29 20:53


Bitcoin dropped by China’s crypto ratings index and puts EOS in top slot

Just days prior to launch, EOS had also seen serious bugs raised by a Chinese internet security firm that required urgent patches to be issued. The report said that loopholes in EOS’ code could expose nodes to attackers, giving them the ability to possibly take “full control” of transactions. In its assessment, the CCID blockchain research team дальше »

2018-6-25 20:34


Фото:

Spacemesh Code Review: PoST Consensus

Actually quite hard to describe from their website what this Spacemesh code review is all about. A post on their page talks about the PoST consensus (more in a second) but the core seems to be that they expect to deliver scaling, security, decentralization (yes, all three) PLUS, wait for it, fairness and inclusiveness, and […] The post Spacemesh Code Review: PoST Consensus appeared first on Crypto Briefing. дальше »

2018-6-22 00:35


123