Click any tag below to further narrow down your results
Links
The article discusses the impact of quantum computing on blockchain security, highlighting the risks of "harvest now, decrypt later" attacks. It examines the current state of blockchain protocols, particularly Bitcoin and privacy chains, and emphasizes the need for transitioning to post-quantum cryptographic methods to safeguard against future threats.
The Ethereum Foundation has established a post-quantum security team to address threats from quantum computing. Led by Thomas Coratger, the initiative includes a $1 million Poseidon Prize for enhancing a key hash function and aims to strengthen Ethereum's defenses against potential quantum attacks.
Shift uses tamper-resistant hardware to securely manage private keys and transaction states, ensuring that digital value moves freely between devices without reliance on software. It incorporates remote attestation to verify the legitimacy of transactions and prevent fraud.
This article explores the concept of finality in blockchain systems, emphasizing how it varies based on social consensus, cryptographic security, and time. It discusses different types of finality, such as social, protocol, and cryptoeconomic finality, and how user beliefs influence their confidence in transaction permanence.
Zero is a decentralized multi-core world computer that uses Zero-Knowledge proofs to enhance blockchain performance. It separates execution from verification, allowing for high transaction speeds and supporting various applications simultaneously. This architecture aims to provide a scalable alternative to traditional cloud services.
A Bitcoin developer has proposed a hard fork to transition BTC from legacy wallets to those secured by post-quantum cryptography, aiming to protect against potential quantum computing threats to current ECDSA signatures. The proposal includes a migration deadline for users to move their funds to more secure wallets, and it has sparked debate within the community about its feasibility and implications.
Web3, originally envisioned as a decentralized alternative to the current Internet dominated by major corporations, has evolved into a broader ecosystem focused on cryptocurrency and financial products. Riad Wahby discusses the integral role of cryptography in Web3, the benefits and risks associated with its rapid development, and the importance of hardware security in safeguarding digital assets. He highlights efforts to enhance hardware security modules to better support the needs of Web3 applications.