Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Security

Links to the best articles, videos and podcasts about Security in the crypto space.

2/ 3
Who Broke the SHA1 Algorithm (And What Does It Mean for Bitcoin)?

"The cryptography world has been buzzing with the news that researchers at Google and CWI Amsterdam have succeeded in successfully generating a 'hash collision' for two different documents using the SHA1 encryption algorithm, rendering the algorithm 'broken' according to cryptographic standards. But what does this mean in plain language, and what are the implications for the bitcoin network?"

2/ 3
Bitcoin Hash Functions Explained

Bitcoin hash functions explained with python code examples.

2/ 3
The Triangle of Harm

Vitalik Buterin on blockchain security, the article describes different types of possible attacks (Finney attack, feather forking, 51% attack, 51% censorship attack).

1/ 3
The Crazy Security Behind the Birth of Zcash, the Inside Story

The story about Zcash from an interesting point of view.

2/ 3
Rewriting History: A Brief Introduction to Long Range Attacks

What a long range attack is and how it works? The article explains weak subjectivity, costless simulation, posterior corruption, stake bleeding, key-evolving cryptography, context-aware transactions, plentitude rule.

1/ 3
What Is A 51% Attack Against The Bitcoin Network?

"The Bitcoin network is one of the most secure types of financial technologies the world has ever seen. Without a central point of failure, or a way to hack the system in general, Bitcoin remains safe from harm. But there is always the looming threat of a 51% attack against the network, which could have dire consequences. But what does such can attack entail, and is it something we should actively worry about?"

2/ 3
Wikipedia: Sybil attack

What exactly is Sybil Attack an how it works?

3/ 3
What is a Sybil attack and how can it affect peer networks?

1/ 3
Understanding the Basics of a Proof-of-Stake Security Model

The primer on Proof-of-Stake security model.

2/ 3
STARKs, Part I: Proofs with Polynomials

The explanation of STARKS. “ZK-STARKs resolve one of the primary weaknesses of ZK-SNARKs, its reliance on a ‘trusted setup’. They also come with much simpler cryptographic assumptions, avoiding the need for elliptic curves, pairings and the knowledge-of-exponent assumption and instead relying purely on hashes and information theory; this also means that they are secure even against attackers with quantum computers.”

1/ 3
A beginner’s guide to Monero

The beginner-friendly introduction to Monero. The article explains how Monero works and why it's more secure than Bitcoin.

2/ 3
Quantum Computers Pose Imminent Threat to Bitcoin Security

"A crucial feature of Bitcoin is its security. Bitcoins have two important security features that prevent them from being stolen or copied. Both are based on cryptographic protocols that are hard to crack. [...] But there is a problem on the horizon. Quantum computers can solve these problems easily. And the first quantum computers are currently under development."

1/ 3
How secure is blockchain really?

The beginner-friendly piece on the security of blockchains from MIT Technology Review. It explains few types of potential attacks.

2/ 3
Stanford physicist finds that swirling liquids work similarly to bitcoin

"The physics involved with stirring a liquid operate the same way as the mathematical functions that secure digital information. This parallel could help in developing even more secure ways of protecting digital information."

1/ 3
Quantifying Decentralization

The post explains ways of quantifying decentralization (minimum Nakamoto coefficient ). Highly technical.

3/ 3
Public Key Cryptography - Computerphile

3/ 3
SHA: Secure Hashing Algorithm - Computerphile

3/ 3
How the US government is using blockchain to fight fraud | Kathryn Haun | TEDxSanFrancisco

Subscribe to our newsletter - get a weekly round-up right to your inbox.