"In summary, a commercial wallet based on a “Secure Split Key” or threshold system can secure a digital wallet, or another type of resource for that matter"
Links to the best articles, videos and podcasts about Security in the crypto space.
"A discussion of Bitcoin’s ability to resist 51% attacks (ie, its “security budget”). Competition makes it difficult for one network to collect enough fees – instead, we should try to collect fees from all networks."
"Eric Budish, a Professor of Economics at the University of Chicago, recently published a working paper called “The Economic Limits of Bitcoin and the Blockchain,” in which he argues that the theoretical threat of a majority attack (a.k.a. 51% attack) in Bitcoin is much higher than we believe."
"In a permissionless cryptocurrency network, peers must not be trusted. So, to prevent against resource exhaustion attacks, Bitcoin nodes first check the PoW for any received blocks before committing more resources, such as storing the block in RAM or on disk. However, it turns out that checking a Proof-of-Stake is a lot more complicated and context-sensitive than validating a Proof-of-Work."
"An in-depth examination of the Ethereum Virtual Machine vs. Kadena’s Pact smart contract language"
"Game theory is one of the most important concepts to grasp to understand blockchains/crypto, strategy, and decision making."
"In this post we will explore a concept that plays a foundational role in ensuring information and computer security — Public Key Cryptography. Since this fascinating idea is the heart of blockchain technology, we will dive into its history, grasp how it works and examine the practical applications in the context of blockchains."
"Many proof of work (PoW) chains aren’t secure. They’re extremely difficult to bootstrap hashpower for and as the value of the network greatly outpaces the coordination and hardware cost of an attack, it becomes quite lucrative to do so. An exception, in this case, would be Bitcoin as it had a first-mover advantage and is the strongest network from both an ideological standpoint and mining operations."
"The Cypherpunks have existed since September, 1992. In that time, a vast amount has been written on cryptography, key escrow, Clipper, the Net, the Information Superhighway, cyber terrorists, and crypto anarchy. We have found ourselves (or _placed_ ourselves) at the center of the storm."
"To repeat a point made earlier, PortSmash currently poses a threat mainly to people using computers or services that allow untrusted people to use the same physical processor. These users should pay close attention to the research and carefully consider the recommendations. For the time being, the risk to others is likely low, but that could change with more research."
"Ultimate Guide to EOS Smart Contract Security. The crypto community became skeptical when the World’s biggest ICO, EOS launched in June 2018 and it got freezed out for 2 days due to a software bug. But fast forward 4 months and EOS today accounts for more than double the transactions that Ethereum does today. Through the promise of free and faster transactions, the topmost Dapp of EOS has about 13,000 daily active users compared to just 2,000 of Ethereum’s topmost Dapp."
"Bulletproofs, was originally published in a 2017 whitepaper from Stanford University and quickly became an area of research within the blockchain community. With the announcement, Monero becomes the first cryptocurrency to adopt bulletproofs as a privacy protocol."
"There’s been a lot of talk about security tokens recently. But what is a security token in the first place? How do they work? And how might they impact your job or business? That is, why should you care about them?"
"When comes to security tokens, security and privacy protocols are not only a technically challenging and often intimidating subject but also one that can challenge the current foundation of crypto-securities. From all the aspects missing in the current generation of security token architectures, security and privacy are the ones I feel can break the premise of the entire ecosystem."
"Cyber security is hardly a sexy topic, and is easy to overlook, but the last thing you want to do as a crypto investor is watch all your money disappear because you were careless about keeping it safe."
"In this paper, we explore how China threatens the security, stability, and viability of Bitcoin through its dominant position in the Bitcoin ecosystem, political and economic control over domestic activity, and control over its domestic Internet infrastructure."
"Identity and reputation are important primitives in the Web 3 world. In this post, I’ll give an overview of the problem space and outline some approaches."