The lengthy (40 min) analysis of the MarkerDAO Protocol.
"Taking protective measures does not need to be difficult or stressful — the best way to shield yourself from these attacks is to understand the means by which hackers are entering private systems, understand the entry-points that the hackers may target, and explore simple solutions that can protect against their go-to attack vectors."
I like that people are like “bitcoin will never replace the dollar! It’s a scam! We don’t need blockchain. Get that away from me.” You legit sound like someone who was shown a light bulb and couldn’t process it, so decided to bet on candlelight.
The author debunks several Crypto-Keynesian fallacies: #1: Aggregate Numbers Tell an Accurate Story; #2: Centrally Designed Systems Work Better than Organic Bottom-Up Reality-Tested Systems; #3: Everyone Will Do Things Exactly As Expected.
"In this article, I will be explaining a foundational architecture that I advise to many of the businesses in the space due to its simplicity, modularity, and platform agnosticism."
The really thorough, lengthy summary of cryptocurrencies, blockchain and decentralization in the context of the financial system.
"EVM provides such a powerful turing-complete computation so that ethereum can run a general program, also known as smart contract. Plasma EVM is a new version of Plasma that can execute EVM in plasma chain, and its clients can be based on current ethereum clients (go-ethereum, py-evm, parity)."
Cryptocurrency centralization is like harvesting metal off a bridge: A slippery slope of free money which works great until suddenly it catastrophically doesn't
"Smart contract security problems pose a serious threat to token sale projects. Not auditing smart contracts for security flaws before deploying might come at a high cost to investors and the project team. Considering the amount of funds that can be lost if your code is hacked, the security audit should be taken not as expenditures but as an investment."
Ethereum's "Difficulty Bomb" explained.
"Instead, in this essay I’ll propose a thought experiment in which a dapp steals value from the protocol that its built on. This is categorically separate from Joel’s fat protocols thesis: it doesn’t make sense to argue that Coinbase somehow steals value from Bitcoin or Ethereum."
"In this piece we’ll cover the latest experimentation and research in four areas of the privacy landscape: 1) privacy coins, 2) smart contract privacy, 3) privacy infrastructure, and 4) privacy research."
"There are hardly any other cryptocurrencies with a rivalry as tense as Ethereum and EOS. Coming in as the number one and number two decentralized app (dapp) platforms by market cap size, both cryptocurrencies polarize crypto enthusiasts as to their preference."
"A new platform called Ekiden solves these major problems by a) decoupling smart contract execution from the underlying state consensus protocol to achieve scalability and b) using hardware support, in particular, Trusted Execution Environments (TEEs) to provide privacy to the execution layer. Ekiden demonstrates superior performance and privacy results in comparison to current smart contract blockchains (e.g. Ethereum)."