"Some of these ideals have been challenged by the rise of the crypto “whales” — the relatively small number of mysterious wallets that hold disproportionate amounts of crypto wealth. It’s important, of course, not to overstate this problem. A vast amount of wealth is held by cryptocurrency addresses, which are not necessarily owned by individuals. In many cases, the addresses belong to cryptocurrency exchanges. "
Trusted Execution Environments (TEE); Secure Multi-party Computation (sMPC); Zero-knowledge Proofs (ZKP).
"Tendermint is a low-level blockchain engine that provides secure and consistent state replication on many machines. It is a weakly synchronous (mostly asynchronous), Byzantine Fault Tolerant (BFT) tool that is used as a plug-and-play consensus for arbitrary application states and distributed systems."
"In-depth Explanation of What EVM is and How EVM Works."
The lengthy (40 min) analysis of the MarkerDAO Protocol.
"Taking protective measures does not need to be difficult or stressful — the best way to shield yourself from these attacks is to understand the means by which hackers are entering private systems, understand the entry-points that the hackers may target, and explore simple solutions that can protect against their go-to attack vectors."
I like that people are like “bitcoin will never replace the dollar! It’s a scam! We don’t need blockchain. Get that away from me.” You legit sound like someone who was shown a light bulb and couldn’t process it, so decided to bet on candlelight.
The author debunks several Crypto-Keynesian fallacies: #1: Aggregate Numbers Tell an Accurate Story; #2: Centrally Designed Systems Work Better than Organic Bottom-Up Reality-Tested Systems; #3: Everyone Will Do Things Exactly As Expected.
"In this article, I will be explaining a foundational architecture that I advise to many of the businesses in the space due to its simplicity, modularity, and platform agnosticism."
The really thorough, lengthy summary of cryptocurrencies, blockchain and decentralization in the context of the financial system.
"EVM provides such a powerful turing-complete computation so that ethereum can run a general program, also known as smart contract. Plasma EVM is a new version of Plasma that can execute EVM in plasma chain, and its clients can be based on current ethereum clients (go-ethereum, py-evm, parity)."
Cryptocurrency centralization is like harvesting metal off a bridge: A slippery slope of free money which works great until suddenly it catastrophically doesn't
"Smart contract security problems pose a serious threat to token sale projects. Not auditing smart contracts for security flaws before deploying might come at a high cost to investors and the project team. Considering the amount of funds that can be lost if your code is hacked, the security audit should be taken not as expenditures but as an investment."
Ethereum's "Difficulty Bomb" explained.