"The cryptography world has been buzzing with the news that researchers at Google and CWI Amsterdam have succeeded in successfully generating a 'hash collision' for two different documents using the SHA1 encryption algorithm, rendering the algorithm 'broken' according to cryptographic standards. But what does this mean in plain language, and what are the implications for the bitcoin network?"
Links to the best articles, videos and podcasts about Security in the crypto space.
Bitcoin hash functions explained with python code examples.
Vitalik Buterin on blockchain security, the article describes different types of possible attacks (Finney attack, feather forking, 51% attack, 51% censorship attack).
The story about Zcash from an interesting point of view.
What a long range attack is and how it works? The article explains weak subjectivity, costless simulation, posterior corruption, stake bleeding, key-evolving cryptography, context-aware transactions, plentitude rule.
"The Bitcoin network is one of the most secure types of financial technologies the world has ever seen. Without a central point of failure, or a way to hack the system in general, Bitcoin remains safe from harm. But there is always the looming threat of a 51% attack against the network, which could have dire consequences. But what does such can attack entail, and is it something we should actively worry about?"
What exactly is Sybil Attack an how it works?
The primer on Proof-of-Stake security model.
The explanation of STARKS. “ZK-STARKs resolve one of the primary weaknesses of ZK-SNARKs, its reliance on a ‘trusted setup’. They also come with much simpler cryptographic assumptions, avoiding the need for elliptic curves, pairings and the knowledge-of-exponent assumption and instead relying purely on hashes and information theory; this also means that they are secure even against attackers with quantum computers.”
The beginner-friendly introduction to Monero. The article explains how Monero works and why it's more secure than Bitcoin.
"A crucial feature of Bitcoin is its security. Bitcoins have two important security features that prevent them from being stolen or copied. Both are based on cryptographic protocols that are hard to crack. [...] But there is a problem on the horizon. Quantum computers can solve these problems easily. And the first quantum computers are currently under development."
The beginner-friendly piece on the security of blockchains from MIT Technology Review. It explains few types of potential attacks.
"The physics involved with stirring a liquid operate the same way as the mathematical functions that secure digital information. This parallel could help in developing even more secure ways of protecting digital information."
The post explains ways of quantifying decentralization (minimum Nakamoto coefficient ). Highly technical.