The high-level view of what smart contracts really are.
Links to the best articles, videos and podcasts about blockchain and cryptocurrency Protocols.
The explanation of ethereum’s gas. Components of gas (gas cost, gas price, gas limit) analyzed.
The article describes the advantages of off-chain solutions.
The article describes three layers of the blockchain stack.
"In proof of stake protocols, however, validators can come and go, and even the absolute size of the validator set can shrink and grow greatly over time. 80% of the validator set at one time may well be smaller than 20% of the validator set at another time, and what in a fixed-set model is clearly equivocation, in a dynamic-set model may not involve any equivocation at all. How do we deal with this?"
From my perspective ‘private blockchains’ are just regular databases but it’s always healthy to hear sound arguments of someone holding a different opinion.
Vitalik Buterin on blockchain security, the article describes different types of possible attacks (Finney attack, feather forking, 51% attack, 51% censorship attack).
The author dissects what a cryptocurrency wallet really is and shows why we won't need it in the future.
Preethi Kasireddy on the whole crypto ecosystem in a beginner-friendly manner. She explains Bitcoin, Ethereum, Blockchain, Tokens, ICO and the connection between them.
The introduction to the oracles.
"Merkele Trees allow us to map a large volume of data and easily identify where changes in the data occur"
This article shows similarities between p2p and blockchain protocols and focuses on applicable lessons from its history.
The primer on Proof-of-Stake security model.
The comparison between two Proof-of-Stake protocols Casper and Tendermint and the profound analysis of the Proof-of-Stake protocol itself.
The explanation of STARKS. “ZK-STARKs resolve one of the primary weaknesses of ZK-SNARKs, its reliance on a ‘trusted setup’. They also come with much simpler cryptographic assumptions, avoiding the need for elliptic curves, pairings and the knowledge-of-exponent assumption and instead relying purely on hashes and information theory; this also means that they are secure even against attackers with quantum computers.”
The white-paper. “We present an authenticated data feed system called Town Crier (TC). TC acts as a bridge between smart contracts and existing web sites, which are already commonly trusted for non-blockchain applications. It combines a blockchain front end with a trusted hardware back end to scrape HTTPSenabled websites and serve source-authenticated data to relying smart contracts.”
“This article compares the different consensus systems powering EOS and Tendermint about each of their underlying technologies and how they uniquely approach Proof-of-Stake (PoS).”
The technical explanation of what ethereum sharding is and how it works.