Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Security

Links to the best articles, videos and podcasts about Security in the crypto space.

3/ 3
What is a Sybil attack and how can it affect peer networks?

1/ 3
Understanding the Basics of a Proof-of-Stake Security Model

The primer on Proof-of-Stake security model.

2/ 3
STARKs, Part I: Proofs with Polynomials

The explanation of STARKS. “ZK-STARKs resolve one of the primary weaknesses of ZK-SNARKs, its reliance on a ‘trusted setup’. They also come with much simpler cryptographic assumptions, avoiding the need for elliptic curves, pairings and the knowledge-of-exponent assumption and instead relying purely on hashes and information theory; this also means that they are secure even against attackers with quantum computers.”

1/ 3
A beginner’s guide to Monero

The beginner-friendly introduction to Monero. The article explains how Monero works and why it's more secure than Bitcoin.

2/ 3
Quantum Computers Pose Imminent Threat to Bitcoin Security

"A crucial feature of Bitcoin is its security. Bitcoins have two important security features that prevent them from being stolen or copied. Both are based on cryptographic protocols that are hard to crack. [...] But there is a problem on the horizon. Quantum computers can solve these problems easily. And the first quantum computers are currently under development."

1/ 3
How secure is blockchain really?

The beginner-friendly piece on the security of blockchains from MIT Technology Review. It explains few types of potential attacks.

2/ 3
Stanford physicist finds that swirling liquids work similarly to bitcoin

"The physics involved with stirring a liquid operate the same way as the mathematical functions that secure digital information. This parallel could help in developing even more secure ways of protecting digital information."

1/ 3
Quantifying Decentralization

The post explains ways of quantifying decentralization (minimum Nakamoto coefficient ). Highly technical.

3/ 3
Public Key Cryptography - Computerphile

3/ 3
SHA: Secure Hashing Algorithm - Computerphile

3/ 3
How the US government is using blockchain to fight fraud | Kathryn Haun | TEDxSanFrancisco

Subscribe to our newsletter - get a weekly round-up right to your inbox.