Результатов: 36

Absurdistan: For $2.5k per day, you can attack Verge (XVG). For $44k you can shut down Electroneum (ETN) as well.

A 51% attack means that 51% of the ‘computer processing power’ used to verify transactions is controlled by one entity, and once this number (51%) has been reached, they can create a new ledger (blockchain ‘fork’ basically) so that they can double spend their own coins (among a few other capabilities). дальше »

2019-3-1 01:51


The Proof-of-Stake Pandora’s Box—A “Rich Get Richer” Formula?

It has been six days since Constantinople had to be forcefully put off because of a bug. Chain Security sniffed out the vulnerability just before miners upgraded gifting hackers—who appear to be on the prowl, to not only siphon out hard earned funds but revive the memories of 2016 DAO attack that as well all […] The post The Proof-of-Stake Pandora’s Box—A “Rich Get Richer” Formula? appeared first on Ethereum World News. дальше »

2019-1-22 15:30


Фото:

Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3

In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack. дальше »

2019-1-1 19:15


Фото:

Report: Cryptocurrency Mining Attacks Likely to Surge in the Future

Kaspersky Lab’s cyber threat and research arm Securelist published a report on November 13, 2018, which provides details on the rising trend of cyber attacks on cryptocurrency exchanges in Q3 2018. The report also mentions prominent cyber attack groups including Lazarus as well as observing massive growth in crypto mining attacks. дальше »

2018-11-15 10:00


Фото:

Researchers Link NotPetya Outbreak and Kiev Power Grid Outage to one Hacking Group

Depending on how one looks at the world, coincidence is either a common thing or doesn’t exist at all. In the world of cyberthreats, it would seem the latter is the more common conclusion. New research shows the NotPetya ransomware attack, as well as a disruption of Ukraine’s power grid, are linked together by one […] The post Researchers Link NotPetya Outbreak and Kiev Power Grid Outage to one Hacking Group appeared first on NullTX. дальше »

2018-11-8 18:58


Фото:

The free internet makes us the product — we need to stop it

The bad headlines continue to stack up for Facebook this year: from the Cambridge Analytica scandal, to the New York Times report that Facebook gave Apple, Samsung, and other mobile device makers access to its users personal data without permission, to the revelation that the firm routinely gives user information and preferences to several Chinese telecommunications firms, to last week’s security breach in which hackers took control of 50 million user accounts as well as any third-party sites those users logged into via Facebook. дальше »

2018-10-6 19:30


Фото:

What Bitcoin Did Gets Technical with Crypto-Educator Jimmy Song

<iframe style="border: none" src="//html5-player. libsyn. com/embed/episode/id/7132345/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/87A93A/" height="90" width="100%" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe> On the latest episode of What Bitcoin Did, host Peter McCormack interviews Jimmy Song, a consultant in blockchain education, to take an in-depth look at a relatively recent incident in the world of cryptocurrency and use that as an example to segue into a deeper discussion on the possible trajectories of Bitcoin itself. дальше »

2018-10-6 00:05


Bitcoin Gold (BTG) Gets Delisted By Bittrex Crypto Exchange Due To $18 Million Hack

Bittrex Exchange Removes Bitcoin Gold From Their Exchange Among cryptocurrency startup companies, the risk of theft, extortion, or major attack is very significant. The cryptocurrency community has always been especially susceptible to crime, because of the prevalence of technology-minded hackers in the markets, as well as the anonymous nature of cryptocurrencies in general. For these […] дальше »

2018-9-4 13:37


A Guide to 99% Fault Tolerant Consensus

Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type). дальше »

2018-8-9 04:03


Are you afraid of cyber attacks? Improve your cyber security!

Even though we are well into our second decade of widespread internet use, the term ‘cyber attack’ is still a relatively new and daunting one for many people. Many individuals and small businesses entrust their cybersecurity to off-the-shelf antivirus softwares, which can effective but certainly aren’t foolproof. When it comes to preventing cyber attacks, everyone […] дальше »

2018-7-27 16:04


Фото:

Governance, Part 2: Plutocracy Is Still Bad

Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way. дальше »

2018-7-21 23:03


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »

2018-7-21 23:03