Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Security

Links to the best articles, videos and podcasts about Security in the crypto space.

2/ 3
Work for Sale — Bootstrapping Security Through Network Protection

"Many proof of work (PoW) chains aren’t secure. They’re extremely difficult to bootstrap hashpower for and as the value of the network greatly outpaces the coordination and hardware cost of an attack, it becomes quite lucrative to do so. An exception, in this case, would be Bitcoin as it had a first-mover advantage and is the strongest network from both an ideological standpoint and mining operations."

2/ 3
THE CYPHERNOMICON

"The Cypherpunks have existed since September, 1992. In that time, a vast amount has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves) at the center of the storm."

2/ 3
Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys

"To repeat a point made earlier, PortSmash currently poses a threat mainly to people using computers or services that allow untrusted people to use the same physical processor. These users should pay close attention to the research and carefully consider the recommendations. For the time being, the risk to others is likely low, but that could change with more research."

2/ 3
Ultimate Guide to EOS Smart Contract Security

"Ultimate Guide to EOS Smart Contract Security. The crypto community became skeptical when the World’s biggest ICO, EOS launched in June 2018 and it got freezed out for 2 days due to a software bug. But fast forward 4 months and EOS today accounts for more than double the transactions that Ethereum does today. Through the promise of free and faster transactions, the topmost Dapp of EOS has about 13,000 daily active users compared to just 2,000 of Ethereum’s topmost Dapp."

2/ 3
Bulletproofs: The New Kid in Blockchain Security Land

"Bulletproofs, was originally published in a 2017 whitepaper from Stanford University and quickly became an area of research within the blockchain community. With the announcement, Monero becomes the first cryptocurrency to adopt bulletproofs as a privacy protocol."

1/ 3
What is a Security Token? A Comprehensive Guide to How They Work and Their Impact

"There’s been a lot of talk about security tokens recently. But what is a security token in the first place? How do they work? And how might they impact your job or business? That is, why should you care about them?"

2/ 3
The Elephant in the Room: Security and Privacy Protocols in Security Tokens

"When comes to security tokens, security and privacy protocols are not only a technically challenging and often intimidating subject but also one that can challenge the current foundation of crypto-securities. From all the aspects missing in the current generation of security token architectures, security and privacy are the ones I feel can break the premise of the entire ecosystem."

1/ 3
A beginners guide to keeping your crypto safe

"Cyber security is hardly a sexy topic, and is easy to overlook, but the last thing you want to do as a crypto investor is watch all your money disappear because you were careless about keeping it safe."

2/ 3
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin

"In this paper, we explore how China threatens the security, stability, and viability of Bitcoin through its dominant position in the Bitcoin ecosystem, political and economic control over domestic activity, and control over its domestic Internet infrastructure."

1/ 3
Five Simple Features that can Improve the Current Generation of Security Token Platforms

1-JavaScript Interfaces; 2-A Smart Contract Catalog; 3-A Real Security Token Standard; 4-Disclosures Marketplace & Analytics; 5-Programming Models and Developer Experience.

2/ 3
Identity and Reputation in Web 3

"Identity and reputation are important primitives in the Web 3 world. In this post, I’ll give an overview of the problem space and outline some approaches."

2/ 3
Why Bitcoin Arbitrage Happens, and Where You Can Find It

"One look at the Bitcoin market will tell you that arbitrage is possible. But, like economic theory, your chances of successfully mastering arbitrage are best when you have a solid understanding of why arbitrage opportunities come about in the Bitcoin market and where you can find these opportunities."

2/ 3
Minimum Viable Security

"Taking protective measures does not need to be difficult or stressful — the best way to shield yourself from these attacks is to understand the means by which hackers are entering private systems, understand the entry-points that the hackers may target, and explore simple solutions that can protect against their go-to attack vectors."

3/ 3
Crypto 101: Security

1/ 3
Russia’s greatest Ponzi mastermind is dead, but his legacy lives on in the crypto world

"Sergei Mavrodi, creator of one of the largest Ponzi schemes in history, died last month at age 62, potentially leaving millions of “investors” in countries around the world in the lurch. Beginning around the fall of the Soviet Union in the early 1990s, Moscow-born Mavrodi’s exploits expanded and evolved over the course of nearly 30 years, putting him in the same league as Bernie Madoff, who operated arguably the biggest such fraud ever, and Charles Ponzi himself, the Italian con artist whose name is now synonymous with this type of financial deception."

1/ 3
Most Common Cryptocurrency Scams & How to Avoid Them

Types of scams: Fake ICOs; Social media giveaway scams; Cloned websites; Ad scams; DNS hacks; Email scams; Fake support teams; Fake exchanges and apps; Cloud Mining scams; Ponzi, pyramid and multi-level; Malware and Crypto Mining; Fake Pools and OTC scams; Pump and dumps; Phone hacks.

1/ 3
7 Ways Cybercriminals Are Scamming a Fortune from Cryptocurrencies

Stealing Directly from Crypto Exchanges; Cryptojacking (Cryptomining Botnets); Wallet Stealers; Stealing Directly from Legit Miners; Malware-Laden Fake Wallet Platforms; Phishing Scams Galore; Theft During ICOs.

1/ 3
The Playdough Protocols

"Commercial security at the birth of writing, arithmetic, and religion in ancient Sumer (modern Iraq)."

Subscribe to our newsletter - get a weekly round-up right to your inbox.