"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"
Links to the best articles, videos and podcasts about Security in the crypto space.
"An in-depth guide on how to be safe in the crypto world and the online world in general."
"An incident will happen at some point. Here’s how to respond."
"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."
"Be careful with what you install."
"Stop handing out your information without doing your due diligence."
"You are harming your users and the ecosystem when you allow people to enter their private keys, keystore files, or mnemonic phrases on your website."
"tldr: I got SIM swapped last weekend and you probably will too. Here’s how I walked away relatively unscathed (knock on wood) and what you should do to protect yourself."
"How to protect yourself from a SIM hijack, deal with an attack as it happens, and recover afterwards."
"Now, some big strides in another hugely important field of cryptography – secure multiparty computation, or MPC – point to a potential Holy Grail situation of both usability and security in a decentralized system."
"Warith Al Maawali, much to his dismay, found his Coinomi wallet compromised and the funds contained in it stolen"
"With the advent of Bitcoin and cryptocurrencies we acquire the ability to be our own banks, with the set back that we don’t acquire natively the ability to safeguard it."
"I lost north of $100,000 last Wednesday. It evaporated over a 24-hour time span in a “SIM port attack” that drained my Coinbase account. It has been four days since the incident and I’m gutted. I have zero appetite; my sleep is restless; I am awash in feelings of anxiety, remorse, and embarrassment."
"This article comprehensively addresses concerns around Bitcoin’s security model which is funded by the block subsidy and transaction fees."
"Thieves have stolen millions of dollars in bitcoin from exchanges. Here’s why it keeps happening."
"One of the greatest threats against Proof of Stake protocols is Long Range attacks. Due to the existence of Weak Subjectivity and Costless Simulation, these attacks are more dangerous than in Proof of Work protocols."
"Proof-of-work cryptocurrencies solve the Byzantine General's Problem and allow for the coordination of a decentralized network of nodes, where some of those nodes may be bad actors. This does, however, creates an attack surface for proof-of-work cryptocurrencies, known as a 51% attack."
"It’s great to see this type of thing picked up by larger media outlets, but while it highlights a lot of interesting points, some of the concepts in the bloomberg article are pretty vague and oversimplified. For example, the main front running problem with DEX’s discussed only applies to a specific type of DEX — others have already solved this."