Visualizing the future of Lightning Network

Technical Updates

The future of Bitcoin: what Lightning could look like
(Aaron van Wirdum)

"The Lightning Network is designed as a scaling layer for Bitcoin. But since many altcoins are software forks of Bitcoin’s codebase(s), it’s often not difficult to create similar scaling layers for these altcoins. Already, a small Litecoin Lightning Network exists, and more Lightning Networks are likely to follow."

Lightning user experience: a day in the life of Carol
(Bryan Vu)

"As far as Carol can tell, her Lightning purchase experience was fast and simple, but in the background, a few different technologies have made that transaction possible."

Stanford BPASE 2018 day one
(Savil Srivastava)

"Talk 1: Game theory and network attacks: how to destroy bitcoin
Talk 2: State of the art attacks on secure hardware wallets
Talk 3: Smart contracts for bribing miners
Talk 4: Formal Barriers to Proof of Stake Protocols
Talk 5: Programming incentives: an intro to cryptonomics, on Casper POS in Ethereum
Talk 6: ThunderToken: blockchains with optimistic instant confirmation
Talk 7: Smart signatures, experiments in authorization
Talk 8: Hardening Lightning
Talk 9: Enter the Hydra: towards principled bug bounties and exploit-resistant smart contracts"

Decred public dev activity for April

Sia community update-April 2018
(Sia, by Steve Funk)

"Over the past month, 4 Nebulous repos were updated. 35 issues were closed, 6 were created, and 29 pieces of code were added to the core codebase. We have a snapshot of updates here, but tbenz’ official updates can be found weekly in the #announcements channel in Discord."

Commentary on patch qualities

Whitepaper: on the connectivity of mesh networks (range is everything)
(Mesh, by Ram Ramanathan)

"Connectivity, and its relationship to node-density, has been and is a topic of much theoretical research in academia. An interesting aspect that has emerged is that as you increase range (or number of nodes), connectivity happens suddenly. Just below a critical threshold of range, for instance, the network is still heavily fragmented. But with just a small increase, it is connected!"

News & Commentary

Telegram messaing app scraps plans for public coin offering
(WSJ, by Paul Vigna)

"The popular messaging app Telegram has brought in so much money from a small group of private investors that it is calling off a planned sale of cryptocurrency to the wider investing public, according to a person familiar with the matter."

Another report from Cryptobriefing can be found here.

ICOs are cancer
(Michael Flaxman)

"Starting a company has never been cheaper/easier, and raising capital via traditional means these days is quite easy for talented entrepreneurs. If you’re thinking of doing an ICO, you should take a hard look in the mirror and ask yourself why that makes the most sense for your stakeholders."

Thread on general onboarding experience

Square made $34 million of Bitcoin reveneu in Q1

Goldman Sachs to open a Bitcoin trading operation
(NYT, by Nathaniel Popper)

"While Goldman will not initially be buying and selling actual Bitcoins, a team at the bank is looking at going in that direction if it can get regulatory approval and figure out how to deal with the additional risks associated with holding the virtual currency."

How cryptocurrencies stack up against other major investments

Blockchain takes the stage at flagship cryptography conference in Israel
(Bitcoin Magazine, by Amy Castor)

"Later, Peter Gazi, a researcher at blockchain development and research company IOHK, presented Ouroboros Praos, the next-generation, proof-of-stake algorithm for the Cardano blockchain. Finally, Joel Alwen, a researcher at the Institute of Science and Technology in Austria, presented an examination of ASIC-resistant, proof-of-work hashing algorithms."

There is no middle ground on encryption
(EFF, by David Ruiz)

"Yet this is precisely what exceptional access demands—more keys, more access, and more vulnerability. Exceptional access, at its core, erodes encryption security, granting law enforcement either its own set of private keys for every encrypted device and individual who sends and receives encrypted messages, or requiring the creation—and secure storage—of duplicate keys to be handed over."


© Copyright 2020 All rights reserved.