Attacker - Свежие новости [ Фото в новостях ] | |
A Guide to 99% Fault Tolerant Consensus
Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type). дальше »
2018-8-9 04:03 | |
A Prehistory of the Ethereum Protocol
Although the ideas behind the current Ethereum protocol have largely been stable for two years, Ethereum did not emerge all at once, in its current conception and fully formed. Before the blockchain has launched, the protocol went through a number of significant evolutions and design decisions. дальше »
2018-7-21 23:03 | |
STARKs, Part I: Proofs with Polynomials
Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »
2018-7-21 23:03 | |
STARKs, Part II: Thank Goodness It's FRI-day
Special thanks to Eli Ben-Sasson for ongoing help and explanations, and Justin Drake for reviewing In the last part of this series, we talked about how you can make some pretty interesting succinct proofs of computation, such as proving that you have computed the millionth Fibonacci number, using a technique involving polynomial composition and division. дальше »
2018-7-21 23:03 | |
Survey: 45% of security professionals reuse the same password
There’s a saying — “practice what you preach. ” If you give advice, make sure it’s something you follow personally. Turns out, some security pros aren’t doing that. A survey of 306 infosec professionals at London’s Infosecurity Conference 2008 from Lastline showed that 45 percent commit one of the biggest security cardinal sins — reusing passwords across accounts. дальше »
2018-7-18 11:29 | |
Op Ed: Addressing the Threat of Cryptomining Malware
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »
2018-7-18 23:18 | |
New Malware Swaps Intended Crypto Addresses for the Hacker’s Own
Crypto users have been targeted by malware for years now. With crypto becoming increasingly popular, cyber criminals have continued to invent new and more advanced ways to steal them. And now there is a new one that swaps an intended crypto address for one that belongs to the attacker. While it’s not the first such […] дальше »
2018-7-5 01:00 | |
Bitcoin Cash [BCH] under attack: An individual vs investors!
An unknown engineer is debilitating to strike the Bitcoin Cash [BCH] coordinated with a progression of spam attacks that the attacker accepts to be sufficient enough to shake the system. The engineer had addressed individuals about his endeavor in the not-so-distant past, however, on June 22nd, the anonymous attacker said that the surge has begun and […] дальше »
2018-6-27 14:26 | |
16 arrested in Monero Japan on the Crytojacking case
Japanese prosecutors from 10 prefectures have arrested 16 individuals suspected of involvement in an ongoing criminal case of cryptojacking, local news outlet The Asahi Shimbun reports June 15. Cryptojacking is the practice of using unsuspecting users’ processing power in order to mine cryptocurrency for the attacker. According to the report by Asahi Shimbun, the arrested дальше »
2018-6-17 03:07 | |