Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

intermediate

2/ 3
Crypto Mining 101 - Overview & Landscape of the Mining Industry

"In this post I will share an overview of the Bitcoin & crypto mining space, the underlying hardware which powers mining, an ecosystem landscape, and dive into the revenue & market size of the space."

2/ 3
Debunking the ‘Bitcoin Cannot Do Smart Contracts’ Myth

"The main selling point of systems like Ethereum and EOS is their ability to execute smart contracts, at least according to the supporters of those projects. To them, Bitcoin is simply too limited and conservative, and new approaches are needed to unlock the true power of blockchain technology."

2/ 3
Cantor was Wrong: debunking the infinite set hierarchy

"A common strand of mathematics argues that, rather than being one single kind of infinity, there are actually an infinite hierarchy of different levels of infinity."

2/ 3
Bitcoin Cash 51% Attack & On-Chain Analysis With Willy Woo

"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"

2/ 3
The Nature of Cryptocurrency Markets

"An analysis of three trend-based strategies"

2/ 3
The Fall of Certificate Authorities and The Rise of Handshake

"Certificate Authorities have been a central part of maintaining DNS and the internet since their inception, and have played a significant role in keeping the internet secure."

2/ 3
Degrees of architectural (de)centralization: To Infura and beyond

"We spend a lot of time discussing barriers to entry as it relates to user experience in crypto. We do not spend enough time discussing barriers to entry around developer experiences in crypto, so we’d like to take this opportunity to do just that."

2/ 3
Overview of Layer 2 approaches: Plasma, State Channels, Side Chains, Roll Ups

"The core idea behind any Layer 2 solution is that it allows several parties to securely interact in some way without issuing transaction on the main chain (which is the Layer 1), but still to some extent leveraging the security of the main chain as the arbitrator."

2/ 3
Risk-adjusted token bonding curves

"We need additional crypto-economic mechanisms for building more sustainable financing applications, such as tokenised impact bonds, that can dynamically adapt to changing risks over time within complex systems. Let’s begin this experimentation with a risk-adjusted token bonding curve pricing oracle."

2/ 3
Dynamic Governance: Where Cybernetics Meets Sociology

"Imagine a governance system where everyone’s individual voice is considered and decisions are determined by consent. Sound like a utopian fantasy? It’s not. Dynamic governance, also known as sociocracy, has a track record of real world implementation and has proved effective in organizations of up to 1,800 people."

2/ 3
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."

2/ 3
Why Do We Need Transaction Data?

"In this article, you’ll find a technical explanation of transaction input data, including what it is and how it works."

2/ 3
Using AI-Enhanced DPOS (Delegated Proof of Stake) To Improve Cryptocurrency Transaction Rate

"Could AI be the difference maker as crypto looks to compete with mainstream digital payments giants such as Visa and PayPal?"

2/ 3
What is “Bitcoin halving” & its potential of powering an extended bull run into 2020–21?

"Bitcoin & Litecoin are both headed for halving, which could propel these Cryptos to Parabolic highs"

2/ 3
The dangers of malicious browser extensions

"Be careful with what you install."

2/ 3
Be careful with your KYC documents

"Stop handing out your information without doing your due diligence."

2/ 3
Private Keys + Websites = 💀

"You are harming your users and the ecosystem when you allow people to enter their private keys, keystore files, or mnemonic phrases on your website."

2/ 3
The SIM Swapping Bible: What To Do When SIM-Swapping Happens To Yo

"How to protect yourself from a SIM hijack, deal with an attack as it happens, and recover afterwards."

Subscribe to our newsletter - get a weekly round-up right to your inbox.