Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.


Links to the best articles, videos and podcasts about Security in the crypto space.

1/ 3
Ethereum is full of ponzis, is that a problem?

The author explains the difference between Ponzi games and schemes and analyses them in the context of ethereum.

2/ 3
Bitcoin and the Rise of the Cypherpunks

"While many of the innovations in the space are new, they're built on decades of work that led to this point. By tracing this history, we can understand the motivations behind the movement that spawned bitcoin and share its vision for the future."

2/ 3
6 Ways a Site Can Attack your MetaMask

"Due to the fast moving nature of the space, we also know that security is an ongoing evolution, so we would like to proactively point out a few possible attacks that users should be aware of."

2/ 3
An Introduction to Censorship-Resistant Store of Value

The article focuses on the censorship-resistant aspect of cryptocurrencies.

2/ 3
(Very) Basic Elliptic Curve Cryptography

“ECC is a way to encrypt data so that only specific people can decrypt it. This has several obvious real life use cases, but the main usage is in encrypting internet data and traffic. For instance, ECC can be used to ensure that when an email is sent, no one but the recipient can read the message.”

2/ 3
Smart Contract Security: Reentrancy Attacks

The explanation of the reentrance attack with both high-level view and some low- level code examples.

1/ 3
The Verge Hack, Explained

The article explains in great detail how the verge hack was possible.

2/ 3
Is Bitcoin Really Un-Tethered?

"This paper investigates whether Tether, a digital currency pegged to U.S. dollars, influences Bitcoin and other cryptocurrency prices during the recent boom. Using algorithms to analyze the blockchain data, we find that purchases with Tether are timed following market downturns and result in sizable increases in Bitcoin prices."

2/ 3
Safety Under Dynamic Validator Sets

"In proof of stake protocols, however, validators can come and go, and even the absolute size of the validator set can shrink and grow greatly over time. 80% of the validator set at one time may well be smaller than 20% of the validator set at another time, and what in a fixed-set model is clearly equivocation, in a dynamic-set model may not involve any equivocation at all. How do we deal with this?"

2/ 3
Leaf-Node weakness in Bitcoin Merkle Tree Design

The highly technical article that explains the weakness in Bitcoin Merkle Tree Design. The author describes technical aspects, costs and remedies for the potential attack.

2/ 3
Who Broke the SHA1 Algorithm (And What Does It Mean for Bitcoin)?

"The cryptography world has been buzzing with the news that researchers at Google and CWI Amsterdam have succeeded in successfully generating a 'hash collision' for two different documents using the SHA1 encryption algorithm, rendering the algorithm 'broken' according to cryptographic standards. But what does this mean in plain language, and what are the implications for the bitcoin network?"

2/ 3
Bitcoin Hash Functions Explained

Bitcoin hash functions explained with python code examples.

2/ 3
The Triangle of Harm

Vitalik Buterin on blockchain security, the article describes different types of possible attacks (Finney attack, feather forking, 51% attack, 51% censorship attack).

1/ 3
The Crazy Security Behind the Birth of Zcash, the Inside Story

The story about Zcash from an interesting point of view.

2/ 3
Rewriting History: A Brief Introduction to Long Range Attacks

What a long range attack is and how it works? The article explains weak subjectivity, costless simulation, posterior corruption, stake bleeding, key-evolving cryptography, context-aware transactions, plentitude rule.

1/ 3
What Is A 51% Attack Against The Bitcoin Network?

"The Bitcoin network is one of the most secure types of financial technologies the world has ever seen. Without a central point of failure, or a way to hack the system in general, Bitcoin remains safe from harm. But there is always the looming threat of a 51% attack against the network, which could have dire consequences. But what does such can attack entail, and is it something we should actively worry about?"

2/ 3
Wikipedia: Sybil attack

What exactly is Sybil Attack an how it works?

3/ 3
What is a Sybil attack and how can it affect peer networks?

Subscribe to our newsletter - get a weekly round-up right to your inbox.