y0news
AnalyticsDigestsSourcesTopicsRSSAICrypto

#blockchain-security News & Analysis

50 articles tagged with #blockchain-security. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.

50 articles
CryptoBullishEthereum Foundation Blog · Apr 147/102
⛓️

Secured #3: Security Teams

The Ethereum Foundation has significantly expanded its security team over the past year, adding researchers and engineers from diverse backgrounds including cryptography, security architecture, and exploit development. This expansion represents a major investment in strengthening Ethereum's security infrastructure through dedicated expertise from both offensive and defensive security specialists.

Secured #3: Security Teams
$ETH
CryptoNeutralEthereum Foundation Blog · May 187/102
⛓️

Dodging a bullet: Ethereum State Problems

This article discloses a severe security threat that affected the Ethereum platform until the Berlin hardfork was implemented. The vulnerability represented a clear and present danger to the network's stability and security before being resolved through the protocol upgrade.

$ETH
CryptoNeutralEthereum Foundation Blog · Aug 47/102
⛓️

Ethereum Protocol Update 1

Ethereum releases its first major Frontier patch update, requiring users with keys from Go 1.0 rc or C++ 0.9.36 versions to regenerate all keys immediately. This represents a significant security-focused update for the early Ethereum network.

$ETH
CryptoBearishEthereum Foundation Blog · Jan 287/103
⛓️

The P + epsilon Attack

Andrew Miller has identified a new attack vector called the 'P + epsilon Attack' that targets SchellingCoin, a cryptocurrency oracle mechanism. This attack represents a significant vulnerability in cryptoeconomic systems that could impact how decentralized prediction markets and oracle systems function.

AI × CryptoNeutralBitcoinist · 3d ago6/10
🤖

Are Quantum Computers A Threat To XRP Holders? Pundit Breaks Down The Possibilities

A cryptocurrency analyst examines the potential threat quantum computers pose to XRP holders, exploring how different account types face varying levels of risk. The analysis breaks down exposure scenarios and what XRP investors should understand about quantum computing's implications for blockchain security.

Are Quantum Computers A Threat To XRP Holders? Pundit Breaks Down The Possibilities
$XRP
CryptoBullishU.Today · 4d ago6/10
⛓️

Dogecoin Experiments With Quantum-Resistant Transactions, DOGE Engineer Weighs In

Dogecoin is experimenting with quantum-resistant transaction protocols, marking a proactive approach to future cryptographic security threats. A Dogecoin engineer has publicly discussed the initiative, signaling the community's recognition that quantum computing could eventually compromise current encryption standards.

$DOGE
DeFiBullishCrypto Briefing · Apr 76/10
💎

Solana Foundation launches STRIDE and SIRN DeFi security programs

The Solana Foundation has launched two new DeFi security programs called STRIDE and SIRN to enhance security across the Solana ecosystem. The initiative comes in response to recent security exploits, including a hack affecting the Drift protocol, highlighting the urgent need for improved DeFi security measures.

Solana Foundation launches STRIDE and SIRN DeFi security programs
$SOL
AI × CryptoBullishU.Today · Mar 266/10
🤖

Ripple to Strengthen XRP Ledger Security With AI

Ripple Labs announced plans to integrate artificial intelligence technology to enhance the security infrastructure of the XRP Ledger. This move represents part of the growing trend of blockchain projects adopting AI solutions to strengthen their networks.

$XRP
CryptoBullishCoinTelegraph · Mar 106/10
⛓️

Trust Wallet adds real-time scam address checks for crypto users

Trust Wallet has implemented real-time address poisoning protection across 32 EVM-compatible blockchain networks, introducing automated scam address screening functionality. This security enhancement comes as wallet providers face increasing pressure to protect users from sophisticated crypto scams and malicious addresses.

Trust Wallet adds real-time scam address checks for crypto users
CryptoBullishBeInCrypto · Mar 16/1010
⛓️

Crypto Scammers Have Been Quiet in February, Hacks Fall by 90%

Cryptocurrency hacks and exploits dropped dramatically by over 90% in February 2024, totaling just $35.7 million according to CertiK's security report. This represents a significant decrease in malicious activity targeting the crypto ecosystem compared to previous periods.

CryptoBullishCryptoPotato · Feb 287/1010
⛓️

Vitalik Buterin Unveils Ethereum’s Comprehensive Quantum Resistance Roadmap

Vitalik Buterin has announced Ethereum's roadmap for quantum resistance, proposing to replace the current consensus-layer BLS signatures with hash-based cryptographic schemes like Winternitz variants. This represents a significant step in preparing Ethereum's infrastructure against future quantum computing threats.

Vitalik Buterin Unveils Ethereum’s Comprehensive Quantum Resistance Roadmap
$ETH
CryptoNeutralU.Today · Feb 256/105
⛓️

Bitcoin Has 20 Years to Prepare for Quantum Computing Risks: Report

CoinShares research reveals that only 8% of Bitcoin's total supply faces quantum computing risks in the next decade. The report suggests Bitcoin has approximately 20 years to implement necessary security upgrades before quantum threats become critical.

$BTC
CryptoBullishChainalysis Blog · Feb 146/104
⛓️

Chainalysis Hexagate、MegaETH 向けリアルタイム脅威検知を提供

Chainalysis announces that its Web3 security solution Hexagate is now available for MegaETH builders, providing real-time threat detection for smart contracts, tokens, and protocols. The solution uses advanced machine learning to detect suspicious patterns and blockchain transactions in real-time, helping developers identify execution risks, governance abuse, and token anomalies before they escalate.

CryptoNeutralEthereum Foundation Blog · Mar 96/101
⛓️

Secured #2: Public Vulnerability Disclosures

The Ethereum Foundation disclosed the first set of vulnerabilities from its Bug Bounty Programs for both Execution and Consensus layers. These security issues were previously discovered and reported through the foundation's official bounty programs, representing a transparent approach to vulnerability management.

Secured #2: Public Vulnerability Disclosures
$ETH
CryptoBullishEthereum Foundation Blog · Nov 86/102
⛓️

eth2 quick update no. 3

Ethereum 2.0 development continues with security improvements to fork choice mechanisms following audit recommendations. New initiatives include the launch of challenges.ethereum.org and a grant to Herumi for developing high-performance BLS cryptographic implementations.

eth2 quick update no. 3
$ETH
DeFiBearishEthereum Foundation Blog · Jun 256/101
💎

Solidity Storage Array Bugs

The article discusses bugs related to storage arrays in Solidity, the programming language used for Ethereum smart contracts. These bugs can lead to vulnerabilities in smart contract code that could potentially be exploited, affecting the security and reliability of decentralized applications.

CryptoBullishEthereum Foundation Blog · Dec 46/101
⛓️

Ethereum Research Update

Ethereum has completed its fourth hard fork, Spurious Dragon, along with the state clearing process to address denial of service attacks that slowed the network in September and October. The two-hard-fork solution represents the final steps in resolving these network performance issues.

$ETH
CryptoBearishEthereum Foundation Blog · Sep 226/101
⛓️

Transaction spam attack: Next Steps

A transaction spam attack targeted the network using EXTCODESIZE opcode calls, causing blocks to take 20-60 seconds to validate due to excessive disk fetches. This resulted in a 2-3x reduction in network performance as validators struggled to process the malicious transactions.

CryptoNeutralEthereum Foundation Blog · Jul 275/101
⛓️

On Inflation, Transaction Fees and Cryptocurrency Monetary Policy

Blockchain networks face fundamental costs for maintaining security through paying miners or validators in consensus protocols. There are two primary methods for covering these essential security expenses that all blockchains must address.

CryptoNeutralEthereum Foundation Blog · Jun 196/102
⛓️

On Mining

The article discusses decentralization in cryptocurrency mining, sarcastically defining it as the assumption that geographically distributed miners haven't colluded. It addresses recent controversies and debates surrounding mining operations and centralization concerns.

CryptoBearishEthereum Foundation Blog · May 156/103
⛓️

Long-Range Attacks: The Serious Problem With Adaptive Proof of Work

The article discusses long-range attacks as a serious vulnerability in adaptive proof of work systems. It explores the evolution from blockchain-based proof of work to previous attempts like Dagger in creating CPU-friendly mining algorithms resistant to ASIC optimization.

CryptoBearishEthereum Foundation Blog · Feb 96/103
⛓️

Why Not Just Use X? An Instructive Example from Bitcoin

Bitcoin developer Gregory Maxwell discusses a design flaw in the Bitcoin protocol that allows third parties to mutate valid transactions while keeping them functionally identical but with different identifiers. This transaction malleability issue represents a significant technical vulnerability in Bitcoin's architecture.

$BTC
← PrevPage 2 of 2