Новости о Protocol Attack [ Фото новости ] [ Свежие новости ] | |
Origin Defi Protocol Suffers Massive Flash Loan Attack- OUSD Stablecoin Value Plunges 85%
The OUSD stablecoin issuer, Origin Protocol is the latest Defi protocol to fall victim to a flash loan attack. The attack, which occurred in the early hours of Tuesday, on November 17, resulted in the disappearance of tokens worth millions of dollars. дальше »
2020-11-19 13:15 | |
ZenGo Uncovers ‘Dogbyte’ Attack in Diogenes Protocol Proof of Ethereum 2.0 Beacon Chain
Coinspeaker ZenGo Uncovers ‘Dogbyte’ Attack in Diogenes Protocol Proof of Ethereum 2. 0 Beacon ChainThe attack termed as “Dogbyte” allows passive observers to access the secret project to break the security of the protocol. дальше »
2020-9-3 16:32 | |
DeFi Options Protocol Opyn Hacked, Over $371,000 Lost
Opyn, a protocol offering options for ETH, DeFi tokens, as well as insurance on Compound deposits, was hacked. At least 371,260 USDC were lost because of the double-spend attack on... дальше »
2020-8-5 08:02 | |
Ethereum DeFi Protocol Assures “User Funds Are Safe” After Rumored Attack
One of Ethereum and crypto’s “hottest use cases,” decentralized finance, got a big scare on June 17th as some market participants thought that a key application was being attacked by a bad actor. дальше »
2020-6-18 15:00 | |
Investor Losses His Entire Bitcoin Savings in a Hardware Phishing Scam
In a tragic event, Eric Savics, the host of the ”Protocol Podcast” lost all his bitcoin savings — 12 BTC worth over $100k — that he accumulated over 7 years in a hardware phishing attack. “I had all of my Bitcoin stolen from me in a hardware wallet phishing scam. дальше »
2020-6-14 19:29 | |
[Update] Research explores how Zcash and other privacy coins can de-anonymize users, suggests defenses
[Update at 14:50 UTC] Benjamin Winston, Director of Security at ECC, told CryptoSlate via a tweet the paper was simply a “review” of existing material and proposes a new attack that is based on a “faulty understanding” of the Zcash protocol by the Hush team. дальше »
2020-5-13 13:00 | |
‘Hacker’ Trolls Ethereum DeFi Project, Returns some Funds with a Message
The decentralized finance and lending protocol Lendf. me suffered an attack recently. In an interesting turn of events, some of the funds were actually returned with a message for the project. The DeFi community is scrambling to make sense of yet another theft. дальше »
2020-4-21 06:30 | |
Decentralized Exchange Bisq Loses 3 Bitcoin (BTC) and 4,000 XMR ($230k) in an Attack
The decentralized bitcoin trading network Bisq has reported an attack that resulted in the loss of 3 BTC worth nearly $22,000 and 4,000 XMR worth $224,000. The open-source, peer-to-peer exchange that requires no registration to trade cryptos suffered an attack 24 hours ago where the attacker exploited a flaw in Bisq’s trade protocol. Statement on the […] дальше »
2020-4-9 20:31 | |
2,388 ETH Estimated Lost in bZx’s Second Exploit
bZx, the DeFi protocol on the receiving end of the ecosystem’s latest exploit, has been hit with a second attack, this time using the protocol’s own flash loans that were...The post 2,388 ETH Estimated Lost in bZx’s Second Exploit appeared first on Crypto Briefing. дальше »
2020-2-18 10:57 | |
Bitcoin Attack Vector Exposed: How to Force-Refund Your Spent Bitcoin
A weakness has been identified in Bitcoin's protocol which allows users to double-spend their funds, threatening its small merchant userbase. The post Bitcoin Attack Vector Exposed: How to Force-Refund Your Spent Bitcoin appeared first on CCN.com дальше »
2019-12-24 16:02 | |
Hard Problems in Cryptocurrency: Five Years Later
Special thanks to Justin Drake and Jinglan Wang for feedback In 2014, I made a post and a presentation with a list of hard problems in math, computer science and economics that I thought were important for the cryptocurrency space (as I then called it) to be able to reach maturity. дальше »
2019-11-25 04:03 | |
Mimblewimble Attack is ‘Factually Inaccurate’, Grin Team Responds
The claim that hired computing power could “break” the Mimblewimble privacy tool for Litecoin (LTC) is inaccurate, according to a response from the Grin development team. Weakness Did Not Reveal Final Senders or Receivers The Grin team admitted that the protocol held a known weakness, but directing hired computing power from AWS did not constitute an ‘attack’. дальше »
2019-11-20 20:47 | |
Litecoin Creator Charlie Lee Responds to MimbleWimble Privacy Vulnerability
MimbleWimble, the Harry Potter inspired protocol that Litecoin is integrating to become a privacy coin, is in the spotlight but for all the wrong reasons. Ivan Bogatyy, a venture capitalist with Dragonfly Capital, has published a report drawing attention to a security flaw in MimbleWimble’s privacy model. дальше »
2019-11-19 23:46 | |
Cloudflare’s Magic Transit lets you push your entire IP traffic through its servers
Cloudflare today announced the launch of its latest network security product, called Magic Transit. This service allows organizations to send their entire network traffic through Cloudflare’s secure and performance-optimized network, offering protections against DDoS attacks, while simultaneously boosting speeds. дальше »
2019-8-13 15:59 | |
Researchers Exploit Canon DSLR Camera and Demand Bitcoin Ransomware in Latest Hack Attack
Cybersecurity researchers are always looking for flawed systems in order to expose vulnerabilities. The latest effort was made by a group of researchers who hacked a Canon EOS 80D DSLR camera in order to test a ransomware scheme. дальше »
2019-8-13 00:58 | |
DASH CEO: Dash is the Most Secure Cryptocurrency, More Secure Than Bitcoin with Latest Updates
The Dash cryptocurrency, by the Dash Core Group, has recently effected a new protocol which ensures better security for the network. Specifically, the new protocol called Chainlock will make the Dash network immune to a 51% attack or a chain reorganization. дальше »
2019-7-14 19:20 | |
Sidechains vs Plasma vs Sharding
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions. дальше »
2019-6-14 04:03 | |
Bitcoin Cash ABC Miners Did Not “Take Over” the Protocol
For some reason, CoinDesk and other publications have taken to publishing the narrative that Bitcoin Cash leveled a “51% attack” on its own chain. Here is one of the articles in question for reference. дальше »
2019-5-25 10:24 | |
Infographic: An Overview of Compromised Bitcoin Exchange Events
The purpose of this infographic is to visualize the size of large cryptocurrency hacks that have occurred in the past as if they all happened today. The hacks included in this infographic extend beyond exchanges, as there were other large entities that experienced cryptocurrency hacks, such as marketplaces like Silk Road 2. дальше »
2019-5-25 21:56 | |
Bitcoin Cash exploit cripples network during scheduled hardfork upgrade
A bug was reportedly exploited on Bitcoin Cash during a scheduled hardfork upgrade of the protocol. For an hour and a half transactions went unprocessed, causing fees to skyrocket. A source familiar with the project says the exploit “looks like a timed attack,” while other rumors are circulating that the “attacker” placed a 180,000 BCH short […] The post Bitcoin Cash exploit cripples network during scheduled hardfork upgrade appeared first on CryptoSlate. дальше »
2019-5-16 21:43 | |
Vitalik Buterin Eyes Research on Privacy Coin Monero’s Traceability
By CCN: Vitalik Buterin has expressed an interest in incorporating privacy features into Ethereum. He is partial to the ZK-SNARKS technology that is used in privacy coin Zcash. Nonetheless, his senses appear to be particularly keen about any developments surrounding privacy protocols. дальше »
2019-5-11 05:30 | |
Bitcoin Cash blocks tagged with “Satoshi Nakamoto,” rumors of impending attack
Mysteriously, 25 percent of mined Bitcoin Cash blocks are being tagged with “Satoshi Nakamoto. ” Given the May 15th hard fork as part of a scheduled protocol upgrade, it is rumored that the tagging is a miner signaling 51 percent attack. дальше »
2019-5-1 23:30 | |
Zerocoin exploit found, Zcoin attacked, other privacy coins at risk
The Zcoin team discovered a vulnerability in the cryptography of the Zerocoin protocol that allows an attacker to forge zero-knowledge proofs and create coins out of thin air. Coins using the protocol such as Veil are vulnerable to attack until Zerocoin is disabled. дальше »
2019-4-29 22:01 | |
New Cryptojacking Campaign Infects Asia Using More Profitable Tactics
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting. дальше »
2019-4-27 22:07 | |
Op Ed: Why Bitcoin’s “Toxic” Maximalism Makes Sense
Over the years, Bitcoin has gained a reputation for having a “toxic” community of users around it. This accusation is mostly thrown at Bitcoin by proponents of altcoins and those who have supported various Bitcoin hard fork attempts in the past. дальше »
2019-4-5 16:23 | |
VeriBlock’s Bitcoin-Backed Security Protocol Goes Live
After a year on its testnet, the VeriBlock blockchain went live yesterday on the Bitcoin mainnet, allowing exchanges, wallet providers, merchants and other crypto businesses to leverage Bitcoin’s robust blockchain security. дальше »
2019-3-27 19:35 | |
Report: “Wrapped Serials” ZeroCoin Attack
On March 6th 2019, an attack was detected on the PIVX network zerocoin protocol, or zPIV. The linked article provides detailed information about the vulnerability which allows an attacker to fake serials accepted by the network, effectively allowing them to spend zerocoins which were never minted.It also includes information дальше »
2019-3-18 07:11 | |
BetterHash Protocol Lets Pool Miners Regain Control Over Their Hash Power
One problem that concerns many is the centralization of mining within the Bitcoin ecosystem. Fortunately, there are talented developers working to solve this problem and Matt Corallo, full-time Bitcoin developer at Chaincode Labs, is one of them. дальше »
2019-1-26 23:50 | |
ChainLocks: Dash Upgrade To Eliminate 51 Percent Attacks
Payments network Dash (DASH) may soon implement a new, unique network upgrade that will reportedly “eliminate” the threat of a 51% attack from the protocol, once fully implemented ChainLocks enables transactions to be confirmed and secured as soon as the block has been processed, rather than waiting for six other blocks to be signed first. дальше »
2018-12-3 00:06 | |
One Day After the Bitcoin Cash Hard Fork: Takeaways and Latest Developments
Bitcoin Cash, the “big block” project that forked away from the Bitcoin blockchain in August 2017, “hard forked” (split) into two different coins: “Bitcoin Cash ABC” (BCH ABC) and “Bitcoin Cash SV” (BCH SV). дальше »
2018-11-17 02:13 | |
Pigeoncoin (PGN) Hacked Due to Bitcoin Protocol Bug, Copycat Coins in Danger?
Pigeoncoin (PGN), a small market cap digital asset traded on two obscure exchanges, has finally got the spotlight from the crypto community but for the worst reason. A hacker stole 235 million PGN tokens through a Bitcoin protocol bug. дальше »
2018-10-6 07:56 | |
What Bitcoin Did Gets Technical with Crypto-Educator Jimmy Song
<iframe style="border: none" src="//html5-player. libsyn. com/embed/episode/id/7132345/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/87A93A/" height="90" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe> On the latest episode of What Bitcoin Did, host Peter McCormack interviews Jimmy Song, a consultant in blockchain education, to take an in-depth look at a relatively recent incident in the world of cryptocurrency and use that as an example to segue into a deeper discussion on the possible trajectories of Bitcoin itself. дальше »
2018-10-6 00:05 | |
Monero Releases Malware Response Group and Successfully Patches Burn Bug
Monero has officially released its Malware Response Workgroup website yesterday. In an effort to help protect Monero’s community, the website aims to provide resources to educate about the types of malware that may take advantage of users. дальше »
2018-9-29 23:18 | |
Novice, Intermediate or Expert? A Quiz to Test Your Bitcoin Knowledge
Think you know the ins-and-outs of bitcoin? Test yourself with 30 questions that grill you on Bitcoin’s history, technology and politics. The 30 questions are split up into three segments ranging from novice to intermediate to expert, and cover a wide range of topics across the Bitcoin landscape. дальше »
2018-9-26 02:13 | |
Bittrex to Delist Bitcoin Gold Over 51% Attack
Over the last nine months, news. Bitcoin. com has reported on the many misfortunes the project Bitcoin Gold (BTG) has experienced. The forked protocol has been mired with issues and controversy since the day the project was announced will be delisted from the exchange Bittrex. дальше »
2018-9-5 00:55 | |
KICKICO Will Return 70 Million KickCoins Token Holders Amid Security Breach
Ethereum-based protocol KICKICO suffered a hack attack. 70 million KICK tokens were stolen. Currently, the problem is eliminated, and all the stolen tokens are promised to be returned to the holders. дальше »
2018-7-27 13:53 | |
Governance, Part 2: Plutocracy Is Still Bad
Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way. дальше »
2018-7-21 23:03 | |
STARKs, Part I: Proofs with Polynomials
Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »
2018-7-21 23:03 | |
The New York Post Really Doesn’t Have a Clue About Bitcoin
Here at NewsBTC we love hearing the musings of dusty old conservatives trying to debase something they know absolutely nothing about. Today we thought we’d share with you one such baseless attack on the protocol that the bankers just love to hate. дальше »
2018-7-5 21:00 | |
Syscoin Hack Disrupts Binance Prompting Temporary Shutdown 96 BTC ($600,000) is a lot of money to pay for anything, not least a single .
The BTC they received was then withdrawn, prompting Binance to temporarily cease trading and to reset all APIs, which are believed to have facilitated the attack. Intriguingly, the Syscoin hack came just one day after blockchain security protocol Blue claimed that half of the top 50 cryptocurrencies were vulnerable to “destructive flaws”. Binance Cancels All дальше »
2018-7-4 16:43 | |