"First, we need to understand what is unique about bitcoin’s supply compared to the supply of another “hard currency.” Let’s start by comparing bitcoin to another monetary good: gold. "
"A generalized token model for exposure to application growth"
"You would think that the most active blockchain networks might also have the most in-demand tokens. But is that really true? Just how closely do token prices track with activity on their networks?"
"Is staking's maturing ecosystem compelling enough for widespread adoption?"
"Can Ethereum Lose DeFi to its Competitors?"
"The biggest obstacle to understanding its security model is applying existing security frameworks to it. More specifically, the only security model we’ve come close to understanding is Proof of Work (PoW) so we take its security characteristics and transfer them over to Proof of Stake (PoS) to try and compare. This article will go into how these security models are different, why PoW attacks are ineffective in PoS systems, and what some of the real risks to PoS look like."
"To follow, I’ll reason through my expectations for asset prices and the prices of services offered by EKs. While maximalists may dismiss this as hopeless investigation of shitcoins, the behavior of newly launched EKs will impact the development of the sideways market we’re currently in, as well as the bull market to come."
"Are you from the government? Do you feel threatened by Bitcoin? The answer is obviously no and there are more important things to do, but let’s assume you do and you’re China."
"No matter how long you have been in the crypto space, you probably have come across “MimbleWimble” which is a winking reference to the tongue-tying spell from Harry Potter. But, what is MimbleWimble in crypto exactly? And what's magical about it?"
"Therefore, a PoW chain such as Bitcoin, cannot simultaneously be secure and inexpensive to operate. Because if it was inexpensive to operate it would also be inexpensive to successfully attack."
"There’s still room for improvement in signing technology, especially in areas such as privacy and scalability. That's where Schnorr, MAST and Taproot come in."
"Currently there are no threats that have been identified that could prevent or significantly slow adoption of Bitcoin as cash. However, new threats could be discovered or existing threats may prove to be more impactful. Given the impact Bitcoin is likely to have, and the frequency and intensity of past attacks, this remains a real possibility."
"This blog post will give readers a short summary of CryptoCompare’s latest September Exchange Review, which aims to capture the recent developments within the cryptocurrency exchange industry."
"Bitcoin’s mining difficulty is adjusted roughly every two weeks to factor in the hashing power of new miners on the network. While the general trend has been upward almost since the network’s inception, it’s common for there to be brief but significant dips. In December of 2018, for example, mining difficulty dropped three straight times in a row, for a total drop of almost 30%."
"When we started the lockdrop process, we didn’t anticipate how many would take part, now with the lockdrop closed, we want to highlight a few of our takeaways."
The general outline of this talk is going to be "scary stories in bitcoin"
"Every technology cycle is defined by the interplay between innovation and the capital to finance and sustain it. So, if you want to predict a technology’s future course, follow the money…"
"We introduce the concept of headless brands to explain the community-driven brand dynamics of projects which have no centralized managerial body. We describe some elements of a headless brand's lifecycle, from formation to adoption, and suggest strategies to maintain a brand's coherence."