Результатов: 14

Part 4: Genesis of Ledger Recover – Controlling Access to the Backup: Identity Verification

How can Ledger Recover protect the entropy of a Secret Recovery Phrase without just introducing yet another additional mechanism secret-based such as a password, a two-factor authentication or similar? In this section, we will delve into Identity Verification mechanisms which provide access to your backup by yourself and only you. дальше »

2023-9-8 16:04


Funds of Every Wallet Created With The Trust Wallet Browser Extension Could Have Been Stolen Without Any User Interaction

Things to know: – Seed generation of Trust Wallet was flawed, the total entropy was only 32 bits. We have created a file containing all possible seeds. – Fortunately, the Ledger Donjon discovered the vulnerability very quickly and likely avoided one of the biggest hack in the crypto ecosystem. On November 14th 2022, Trust Wallet, […] дальше »

2023-5-18 17:33


Фото:

Cloudflare запустила децентрализованный сервис случайных чисел League of Entropy для блокчейнов

Компания Cloudflare анонсировала запуск проекта League of Entropy, который будет генерировать потоки случайных чисел на блокчейне. Система будет состоять из пяти отдельных серверов, не связанных друг с другом. дальше »

2019-6-19 18:20


Фото:

Cloudflare запустила децентрализованный сервис случайных чисел для блокчейнов

18 июня компания Cloudflare и её партнёры анонсировали запуск «Лиги Энтропии» (League of Entropy), сетки из пяти серверов, которая обеспечит генерирование доступных для каждого и безопасных потоков случайных чисел. дальше »

2019-6-19 11:45


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »

2018-7-21 23:03