Результатов: 2127

Digital Asset Research (DAR) Claims TRON has Plagiarized Code, Justin Sun Responds

Has Justin Sun of Tron Committed Plagiarism? Here’s His Answer… Virtual research specialists at DAR discovered something shady happening inside Tron’s source code. Developers at the company found some unfortunately distinguishable lines of code inside the platform that were also found in other cryptocurrency codes. Plagiarism is looked down upon in crypto as much as […] дальше »

2018-7-31 22:10


Steam removes controversial game accused of mining cryptocurrency

Steam has removed “trivial platformer” game Abstractism from its store following accusations that the game is surreptitiously stealing users’ computing power to mine cryptocurrency. “We have removed Abstractism and banned its developer from Steam for shipping unauthorized code, trolling with content, and scamming customers with deceptive in-game items,” Doug Lombardi, VP of Marketing at Steam, told Hard Fork in an email. дальше »

2018-7-31 12:50


Фото:

Cryptocurrency Wallet SafeWallet Introduces Alternative to Private Keys and Mnemonic Phrases

In a bid to entirely eradicate the issues of loss, theft and other challenges that comes with crypto wallet private keys and mnemonic phrases, SafeWallet has introduced a new system of wallet security that enables users recover their digital currencies with just their QR code based user IDs and preset security questions, according to a press release  by the firm. дальше »

2018-7-30 17:00


Фото:

QR Code Encrypted Private Keys to be Replaced by Crypto Wallet

Decentralized cryptocurrency wallet SafeWallet is launching a new QR code-based user identification system to replace mnemonic phrases and private keys, the firm announced Friday. The app, operated by China-based Cheetah Mobile, will use a two-tier security system to grant users access to their holdings, according to a press release. The first stage will have users scan дальше »

2018-7-27 20:25


Фото:

Etherscan rushes to plug vulnerabilities following strange hacking attempts overnight

Etherscan, the most widely used Ethereum blockchain explorer, has quickly patched security vulnerabilities overnight as hackers exploited certain parts of its service. Hackers successfully manipulated the Disqus API – a third-party service used by Etherscan that allows for comments to be left on Ethereum wallet addresses. дальше »

2018-7-24 13:00


Фото:

Governance, Part 2: Plutocracy Is Still Bad

Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way. дальше »

2018-7-21 23:03


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »

2018-7-21 23:03


Notes on Blockchain Governance

In which I argue that “tightly coupled” on-chain voting is overrated, the status quo of “informal governance” as practiced by Bitcoin, Bitcoin Cash, Ethereum, Zcash and similar systems is much less bad than commonly thought, that people who think that the purpose of blockchains is to completely expunge soft mushy human intuitions and feelings in favor of completely algorithmic governance (emphasis on “completely”) are absolutely crazy, and loosely coupled voting as done by Carbonvotes and similar systems is underrated, as well as describe what framework should be used when thinking about blockchain governance in the first place. дальше »

2018-7-21 23:03


Penn Study: 4 In 5 Leading ICOs Don’t Keep Promises and May Contain Backdoors

According to new research findings from the University of Pennsylvania, many ICOs are taking their investors’ trust for granted. Not only do ICO developers seem to not implement promised features, the investment market as a whole seems to be optimal for ICOs that can be modified at any time. The researchers dug deep into code […] дальше »

2018-7-21 06:25


Фото:

New Research Finds Backdoor ‘Centralized Control’ in Many ICOs

Researchers from the University of Pennsylvania have found that a significant number of ICOs retained centralized control through undisclosed code.   Backdoor Centralization The full paper, titled Coin-Operated Capitalism and published on July 18, is an “interdisciplinary effort spanning law, economics, and computer science,” according to University of Pennsylvania Law Professor David Hoffman. дальше »

2018-7-20 23:00


Фото:

Russia: Crypto Miners and Holders Regulated

Cryptocurrency miners and holders in Russia will be regulated under the Internal Revenue Code, local news outlet Izvestiya reported July 18. The Chairman of the Russian State Duma Committee on Financial Markets, Anatoly Aksakov, told Izvestiya that lawmakers are looking to pass the bill on digital financial assets, or cryptocurrencies, during the autumn session of дальше »

2018-7-19 07:34


Фото:

Review of top 50 ICOs shows most promise things they will never deliver

The most extensive legal report on initial coin offerings (ICOs) is now available to the general public, and the findings are pretty damning. University of Pennsylvania legal professors, alongside research teams, have meticulously studied the top 50 highest grossing ICOs of last year – their whitepapers and their code – to determine if there was any disparity between promises made and cryptocurrencies developed. дальше »

2018-7-18 17:30


Фото:

Op Ed: Addressing the Threat of Cryptomining Malware

One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »

2018-7-18 23:18