"The Lightning Network is designed as a scaling layer for Bitcoin. But since many altcoins are software forks of Bitcoin’s codebase(s), it’s often not difficult to create similar scaling layers for these altcoins. Already, a small Litecoin Lightning Network exists, and more Lightning Networks are likely to follow."
The future of Lightning is looking bright. 😎 Watchtowers, Splicing, AMP, better bitcoin user experience. ⚡️— elizabeth stark (@starkness) May 2, 2018
We wrote a primer for people to learn about how Lightning will work for the end user: https://t.co/MsuHyrE8PC
"As far as Carol can tell, her Lightning purchase experience was fast and simple, but in the background, a few different technologies have made that transaction possible."
"Talk 1: Game theory and network attacks: how to destroy bitcoin
Talk 2: State of the art attacks on secure hardware wallets
Talk 3: Smart contracts for bribing miners
Talk 4: Formal Barriers to Proof of Stake Protocols
Talk 5: Programming incentives: an intro to cryptonomics, on Casper POS in Ethereum
Talk 6: ThunderToken: blockchains with optimistic instant confirmation
Talk 7: Smart signatures, experiments in authorization
Talk 8: Hardening Lightning
Talk 9: Enter the Hydra: towards principled bug bounties and exploit-resistant smart contracts"
Brief snapshot of #Decred's public dev activity for Apr across a few software repos on #GitHub.— Decred (@decredproject) May 2, 2018
152 active PRs, 125 commits, 21,656 additions, and 10,288 deletions in total spread across 2-7 devs per $DCR repo.
Join #dev & #politeia (Slack) to see us go! https://t.co/aCIQ40GuGd pic.twitter.com/TOt3UUaaOr
"Over the past month, 4 Nebulous repos were updated. 35 issues were closed, 6 were created, and 29 pieces of code were added to the core codebase. We have a snapshot of updates here, but tbenz’ official updates can be found weekly in the #announcements channel in Discord."
We're seeing a lot of incomplete or broken security fixes recently, across the board. Presumably this is leading to a lot of cheap bugs for attackers, who are generally going to be more incentivized to analyze patches than defenders are.— Ben Hawkes (@benhawkes) May 2, 2018
"Connectivity, and its relationship to node-density, has been and is a topic of much theoretical research in academia. An interesting aspect that has emerged is that as you increase range (or number of nodes), connectivity happens suddenly. Just below a critical threshold of range, for instance, the network is still heavily fragmented. But with just a small increase, it is connected!"
"The popular messaging app Telegram has brought in so much money from a small group of private investors that it is calling off a planned sale of cryptocurrency to the wider investing public, according to a person familiar with the matter."
Another report from Cryptobriefing can be found here.
"Starting a company has never been cheaper/easier, and raising capital via traditional means these days is quite easy for talented entrepreneurs. If you’re thinking of doing an ICO, you should take a hard look in the mirror and ask yourself why that makes the most sense for your stakeholders."
1/ Satoshi turned money into pure information. He transformed a hierarchical "client-server" based money into a flat p2p money. It is not a company. It is a client that allows you to trustlessly join a global economy— Brendan Bernstein (@BMBernstein) May 2, 2018
Understanding this is eye opening—but no new users do anymore
Of Square's $669 million of first-quarter revenue, $34 million came from bitcoin: pic.twitter.com/WRbTjwplLf— Lily Katz (@LilyKatz) May 2, 2018
"While Goldman will not initially be buying and selling actual Bitcoins, a team at the bank is looking at going in that direction if it can get regulatory approval and figure out how to deal with the additional risks associated with holding the virtual currency."
"Later, Peter Gazi, a researcher at blockchain development and research company IOHK, presented Ouroboros Praos, the next-generation, proof-of-stake algorithm for the Cardano blockchain. Finally, Joel Alwen, a researcher at the Institute of Science and Technology in Austria, presented an examination of ASIC-resistant, proof-of-work hashing algorithms."
"Yet this is precisely what exceptional access demands—more keys, more access, and more vulnerability. Exceptional access, at its core, erodes encryption security, granting law enforcement either its own set of private keys for every encrypted device and individual who sends and receives encrypted messages, or requiring the creation—and secure storage—of duplicate keys to be handed over."
Mar 14, 2019
Feb 4, 2019
Nov 16, 2018
May 11, 2018
May 1, 2018
Apr 16, 2018
Mar 16, 2018
Mar 14, 2018
Feb 28, 2018
Jan 30, 2018
Jan 25, 2018
Jan 17, 2018
Jan 15, 2018
Jan 9, 2018
Jan 8, 2018