648 articles tagged with #security. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.
CryptoBullishEthereum Foundation Blog · Sep 96/103
⛓️A bug bounty program was launched to identify vulnerabilities in the beacon chain specification and client implementations including Lighthouse, Nimbus, Teku, and Prysm. The program has yielded enlightening vulnerability reports and valuable lessons from patching potential security issues.
CryptoBullishEthereum Foundation Blog · Mar 316/101
⛓️Ethereum 2.0 development continues progressing with Least Authority completing the Phase 0 security audit and launching a pre-launch bounty program. Client teams are moving toward production readiness while work continues on unifying eth1 and eth2 communications.
$ETH
CryptoNeutralEthereum Foundation Blog · Jan 86/103
⛓️The article provides an update on the Vyper compiler, a programming language originally created by Vitalik Buterin as a safer replacement for Serpent. Vyper was designed with language-level safety features but appears to have faced development challenges after its initial creation.
DeFiBearishEthereum Foundation Blog · Jun 256/101
💎The article discusses bugs related to storage arrays in Solidity, the programming language used for Ethereum smart contracts. These bugs can lead to vulnerabilities in smart contract code that could potentially be exploited, affecting the security and reliability of decentralized applications.
CryptoBullishEthereum Foundation Blog · Feb 146/101
⛓️Ethereum core development teams are making significant progress on implementing the Metropolis hard fork after resolving previous security issues. The development work has resumed in full force over the past month and a half, building upon the progress made in the previous year.
$ETH
CryptoNeutralEthereum Foundation Blog · Nov 96/103
⛓️A storage corruption bug discovered last week was found to be much less severe than initially believed. The small number of affected contracts are either only exploitable by owners or can only cause service disruptions rather than financial losses.
CryptoBullishEthereum Foundation Blog · Sep 16/102
⛓️Ethereum announces that Yoichi Hirai, a PhD holder from the University of Tokyo, is joining as a formal verification engineer. Hirai previously developed formal verification tools for Ethereum and specializes in formalizing communicating parallel processes.
$ETH
CryptoBearishEthereum Foundation Blog · Jul 226/102
⛓️The article discusses challenges faced during the DAO soft-fork attempt, highlighting underestimated side effects on the consensus protocol including DoS vulnerabilities and implementation data races. The rushed implementation introduced critical technical issues that posed significant risks to the network.
DeFiNeutralEthereum Foundation Blog · Jun 196/101
💎A community-driven effort has compiled a comprehensive list of major Ethereum smart contract vulnerabilities, including the DAO hack and various smaller thefts ranging from 100-10,000 ETH. The analysis covers security flaws in games, token contracts, and other DeFi applications that have resulted in significant financial losses.
$ETH
CryptoNeutralEthereum Foundation Blog · Jun 105/101
⛓️Solidity development began in October 2014 before Ethereum had real-world testing, with early design decisions influenced by the Serpent language. The article discusses the evolution of smart contract security considerations as gas costs and network understanding have changed significantly since Solidity's inception.
$ETH
CryptoBullishEthereum Foundation Blog · Feb 176/102
⛓️Martin Swende leads the Ethereum Bounty Program leaderboard following hacking activities at DEVCON1, with the latest bounty award being 5 BTC. The ongoing program remains open to anyone as BTC Relay prepares for its launch on Ethereum.
$BTC$ETH
CryptoNeutralEthereum Foundation Blog · Nov 95/102
⛓️The article discusses stateful Turing-complete policies as a solution to internet security challenges, particularly focusing on securing user accounts which have been a persistent problem over the past twenty years. It addresses issues with current password-based authentication systems where users manage hundreds of accounts across different websites.
CryptoBearishEthereum Foundation Blog · Oct 106/102
⛓️A security advisory has been issued for eth (cpp-ethereum) users running with UPnP enabled, indicating a medium likelihood vulnerability. This affects a specific configuration of the Ethereum client software and poses potential security risks to affected nodes.
$ETH
CryptoNeutralEthereum Foundation Blog · Sep 145/101
⛓️The article examines the technical implications and security considerations of different blockchain block times, comparing networks with varying confirmation speeds like Bitcoin's 10-minute blocks versus faster alternatives with 17-second blocks. It explores how block time affects network security, transaction finality, and overall blockchain performance.
CryptoBearishEthereum Foundation Blog · Aug 206/102
⛓️A consensus issue occurred on the Ethereum Frontier network at block 116,522 on August 20, 2015, involving a state database problem in geth that could lead to deletion of account data. The issue has been classified as high impact but has since been fixed.
CryptoNeutralEthereum Foundation Blog · Feb 146/104
⛓️The article discusses the fundamental tradeoff between subjectivity and exploitability in consensus mechanisms. While consensus systems can be designed to resist attackers up to a certain threshold, they remain vulnerable to exploitation when attackers control sufficient resources, highlighting inherent security limitations in proof-of-work and other consensus architectures.
CryptoNeutralEthereum Foundation Blog · Nov 255/102
⛓️The article discusses proof of stake consensus mechanisms, highlighting their benefits including improved efficiency, larger security margins, and immunity to hardware centralization. However, it notes that proof of stake algorithms are significantly more complex than proof of work systems.
CryptoBearishEthereum Foundation Blog · Feb 96/103
⛓️Bitcoin developer Gregory Maxwell discusses a design flaw in the Bitcoin protocol that allows third parties to mutate valid transactions while keeping them functionally identical but with different identifiers. This transaction malleability issue represents a significant technical vulnerability in Bitcoin's architecture.
$BTC
AIBearishFortune Crypto · 5h ago5/10
CryptoBearishBlockonomi · 15h ago5/10
CryptoBullishBitcoinist · 21h ago5/10
GeneralBearishCrypto Briefing · 1d ago5/10
AIBullishBlockonomi · 1d ago5/10
AIBearishThe Verge – AI · 1d ago5/10
CryptoBullishNewsBTC · 1d ago5/10