#blockchain-security

[ follow ]
fromHackernoon
1 year ago

The Limits of Automated Selfish Mining Detection | HackerNoon

Our analysis is agnostic to the values of system model and attack parameters and it is flexible to their changes. Hence, it allows us to tweak the parameter values and study their impact on the optimal expected relative revenue, while preserving formal guarantees on the correctness.
Cryptocurrency
fromHackernoon
11 months ago

Why TEE-Based Smart Contracts Still Aren't Fully Secure | HackerNoon

The private keys in TEE-assisted systems are extremely crucial but hard to manage. Placing application keys in a single TEE enhances security but creates a single point of failure. Meanwhile, sharing keys among multiple TEEs increases availability but raises the risk of key exfiltration. Key sharing technologies remain complex and inadequate in addressing these challenges, raising concerns about potential attacks that could leverage compromised attestation keys to present false execution confirmations.
Privacy technologies
fromcointelegraph.com
1 week ago

The crypto trap that won't let you sell and how to avoid it

Modern honeypot scams involve deceptive tactics such as tampered wallets sold on platforms like TikTok, which are preloaded with private keys used to instantly steal funds.
Cryptocurrency
#bitcoin
fromHackernoon
3 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

fromHackernoon
3 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

fromMedium
1 month ago

Best Ways to Get XLA Today

Scala XLA staking is crucial for rewards and network security, offering passive income while supporting the proof-of-stake consensus mechanism.
Scala
Cryptocurrency
fromcointelegraph.com
3 months ago

What are address poisoning attacks in crypto and how to avoid them?

Address poisoning attacks manipulate cryptocurrency addresses to reroute transactions and steal digital assets, posing serious risks to the integrity of blockchain.
Growth hacking
fromHackernoon
1 year ago

The TechBeat: How to Fit an Elephant in a Spreadsheet (2/22/2025) | HackerNoon

Decentralization and security in apps are enhanced through innovations like EVEDEX's merging of social logins and Account Abstraction.
Fake job interview scams threaten blockchain developers, revealing gaps in security and awareness in the community.
Tether is transforming its role by holding significant U.S. government debt, shifting from a stablecoin to a strategic financial player.
Examining the notion of reality as a simulation introduces profound philosophical and existential questions about our existence.
[ Load more ]