Результатов: 28
Фото:

Apple steps in to automatically remove Zoom’s risky software from Macs

Apple has pushed a silent update to Mac users to remove the web server sneakily installed by popular video conference app Zoom, TechCrunch reports. Earlier this week, a disclosure by security researcher Jonathan Leitschuh revealed how Zoom installed a secret local web server on Mac devices — with an intent to save an extra click — but left users vulnerable by making it possible for an attacker to hijack their webcams. дальше »

2019-7-11 08:41


Sidechains vs Plasma vs Sharding

Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions. дальше »

2019-6-14 04:03


Фото:

Report Claims That “Sextortionists” Absconded With Over $300,000 in Crypto in 2018

Most cyberattacks in the crypto space involve hackers finding a way around the security of crypto exchange platforms and gaining access to users’ funds. Last year saw the entry of a new breed of cyber extortionists that seems to be gaining ground, so much so that they were able to steal over $300,000 in bitcoin (BTC) tokens in 2018. дальше »

2019-3-1 18:10


How Bitcoin Investors Can Ensure Extra Security and Privacy When Trading Crypto Assets Using VPNs

Online security is one of the largest problems that internet users are facing today, and this has been an issue for years now. While an average user has the potential to get exposed to online threats such as malware or hackers, the situation may be even worse for cryptocurrency traders. Ever since cryptocurrencies exploded in […] дальше »

2019-1-19 20:22


Фото:

Governance, Part 2: Plutocracy Is Still Bad

Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way. дальше »

2018-7-21 23:03