You are here |
blog.ethereum.org | ||
| | | |
thebitcoinmanual.com
|
|
| | | | Malicious actors can open a fake channel with the victim and never publishing it onchain and therefore lock up or drain a victims funds without risking their capital | |
| | | |
hackingdistributed.com
|
|
| | | | We explore the space of trust-minimizing coordination mechanisms for on-chain vote buying and exploitation in the permissionless model. | |
| | | |
braiins.com
|
|
| | | | An explanation on the different roles nodes and miners play to support the Bitcoin network. We explore their purpose, requirements, incentives and how each is critical in keeping Bitcoin secure and decentralized. | |
| | | |
www.soliduslabs.com
|
|
| | Should you buy or build a trade surveillance system? Explore cost, efficiency, and scalability factors to make the best decision for your firm. |