The author explains the difference between Ponzi games and schemes and analyses them in the context of ethereum.
Links to the best articles, videos and podcasts about Security in the crypto space.
"While many of the innovations in the space are new, they're built on decades of work that led to this point. By tracing this history, we can understand the motivations behind the movement that spawned bitcoin and share its vision for the future."
"Due to the fast moving nature of the space, we also know that security is an ongoing evolution, so we would like to proactively point out a few possible attacks that users should be aware of."
The article focuses on the censorship-resistant aspect of cryptocurrencies.
“ECC is a way to encrypt data so that only specific people can decrypt it. This has several obvious real life use cases, but the main usage is in encrypting internet data and traffic. For instance, ECC can be used to ensure that when an email is sent, no one but the recipient can read the message.”
The explanation of the reentrance attack with both high-level view and some low- level code examples.
The article explains in great detail how the verge hack was possible.
"This paper investigates whether Tether, a digital currency pegged to U.S. dollars, influences Bitcoin and other cryptocurrency prices during the recent boom. Using algorithms to analyze the blockchain data, we find that purchases with Tether are timed following market downturns and result in sizable increases in Bitcoin prices."
"In proof of stake protocols, however, validators can come and go, and even the absolute size of the validator set can shrink and grow greatly over time. 80% of the validator set at one time may well be smaller than 20% of the validator set at another time, and what in a fixed-set model is clearly equivocation, in a dynamic-set model may not involve any equivocation at all. How do we deal with this?"
The highly technical article that explains the weakness in Bitcoin Merkle Tree Design. The author describes technical aspects, costs and remedies for the potential attack.
"The cryptography world has been buzzing with the news that researchers at Google and CWI Amsterdam have succeeded in successfully generating a 'hash collision' for two different documents using the SHA1 encryption algorithm, rendering the algorithm 'broken' according to cryptographic standards. But what does this mean in plain language, and what are the implications for the bitcoin network?"
Bitcoin hash functions explained with python code examples.
Vitalik Buterin on blockchain security, the article describes different types of possible attacks (Finney attack, feather forking, 51% attack, 51% censorship attack).
The story about Zcash from an interesting point of view.
What a long range attack is and how it works? The article explains weak subjectivity, costless simulation, posterior corruption, stake bleeding, key-evolving cryptography, context-aware transactions, plentitude rule.
"The Bitcoin network is one of the most secure types of financial technologies the world has ever seen. Without a central point of failure, or a way to hack the system in general, Bitcoin remains safe from harm. But there is always the looming threat of a 51% attack against the network, which could have dire consequences. But what does such can attack entail, and is it something we should actively worry about?"
What exactly is Sybil Attack an how it works?