DEVCON1: Universal Hash Time - Jeff Coleman

Rewriting History: A Brief Introduction to Long Range Attacks

Proof of Stake protocols are in the spotlight as more and more high-profile blockchains attempt to switch over from Proof of Work protocols. Many of them explore the option of hybrid systems (PoW/PoS) while others aim for a pure PoS implementations.One of the greatest threats against Proof of Stake protocols ... Read More
Mapping the ICO threat landscape

Mapping the ICO threat landscape

You’re already on the path for an ICO. Along with you, there are numerous people trying to do the same. Not all of them have that great idea of yours, but they might know that you do. They could just join you, and you know, not all people are polite ... Read More