"This paper presents a sketch of a new building block for decentralized finance: yTokens. yTokens are like zero-coupon bonds: on-chain obligations that settle on a specific future date based on the price of some target asset, and are secured by collateral in another asset."
"But because Bech32 is designed from some cool (but potentially confusing) mathematics rather than just chucking a hash on the end, this article will hopefully make some of the underlying technical details a bit more transparent for all those interested."
"One of the weaknesses of all voting, including quadratic voting, is that for any large-scale issue each individual’s ability to affect the result is so small, and so the incentive to deeply reflect and understand one’s genuine beliefs about an issue is tiny."
"A Decentralized Redeemable BTC-backed ERC-20 Token"
"Wavelet introduces a novel family of directed-acyclic-graph (DAG)-based consensus protocols. It is designed to alleviate the numerous scalability dilemmas predicated in decentralized ledgers, such as those that utilize either the longest chain rule, or some variant of stake delegation or committee election scheme."
"René Girard was a literary theorist, philosopher, and sociologist, who wrote about the nature of desire—among many other topics. His model of borrowed desire applies exceptionally well to financial bubbles. This paper explores the theory, with examples from the 19th, 20th, and 21st centuries."
"Within a matter of hours, Coinbase Security detected and blocked the attack. Here’s how it unfolded."
"Do Libra’s Intentions Line Up With What Its Source Code Tells Us?"
"In order to do that, the machines need to agree on a global clock. The “clock problem” is the challenge in getting many distrusting machines to agree on a global clock in Byzantine settings. Once everyone agrees on a global clock, transaction ordering becomes a much simpler problem because each transaction is timestamped using the same global clock."
"Today, we’ll look at the DPA layer of Swarm, which is responsible for parcellating files into chunks and putting them back together, along with encrypting & decrypting them. In this blog, I will try to depict these four functionalities and the inner workings of the DPA. The image below shows where the DPA fits in the Swarm architecture."
"Given this fundamental similarity, why go with one approach over the others?"
"Although often described as debt instruments, they are far more complex than a traditional bond and involve elements of options trading. Reverse convertibles expose investors not only to risks traditionally associated with bonds and other fixed income products—such as the risk of issuer default and inflation risk—but also to the additional risks of the unrelated assets, which are often stocks."
"This paper will show that public perception is wrong, anchored in a bygone era and built on a foundation of bad data and false assumptions"
"Recently we have released our open source proposal for a derivative token standard: ERC-721o. In this article, we explain the standard for non-financial people and also will explain why derivatives are such a large and interesting market."
"A forward contract is a type of derivative that represents a bilateral agreement to buy or sell an asset at a specific price (the “forward rate”) at a predetermined date in the future, usually to strategically hedge against price changes. The forward rate is a mutually agreed upon fair price at settlement, that takes into account factors like the spot price at the creation of the contract, growth from interest rates, and cost of storage. Forward contracts are handled between two parties, usually without the need for an exchange or clearing house, so both parties must trust each other to meet the terms of the agreement."
"A recurring Ethereum discussion topic is the storage requirements for running an Ethereum node. Some will say that an Ethereum node uses several terabytes of storage while others insist that it is much less."
"Digital advertising is broken. The marketplace for online advertising, once domi-nated by advertisers, publishers and users, has become overrun by “middleman” adexchanges, audience segmentation, complicated behavioral and cross-device usertracking, and opaque cross-party sharing through data management platforms.Users face unprecedented levels of malvertisements and privacy violations."