y0news
AnalyticsDigestsSourcesTopicsRSSAICrypto

#security News & Analysis

648 articles tagged with #security. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.

648 articles
CryptoBullishEthereum Foundation Blog · Sep 96/103
⛓️

Secured no. 1

A bug bounty program was launched to identify vulnerabilities in the beacon chain specification and client implementations including Lighthouse, Nimbus, Teku, and Prysm. The program has yielded enlightening vulnerability reports and valuable lessons from patching potential security issues.

Secured no. 1
CryptoBullishEthereum Foundation Blog · Mar 316/101
⛓️

eth2 quick update no. 10

Ethereum 2.0 development continues progressing with Least Authority completing the Phase 0 security audit and launching a pre-launch bounty program. Client teams are moving toward production readiness while work continues on unifying eth1 and eth2 communications.

eth2 quick update no. 10
$ETH
CryptoNeutralEthereum Foundation Blog · Jan 86/103
⛓️

Update on the Vyper Compiler

The article provides an update on the Vyper compiler, a programming language originally created by Vitalik Buterin as a safer replacement for Serpent. Vyper was designed with language-level safety features but appears to have faced development challenges after its initial creation.

Update on the Vyper Compiler
DeFiBearishEthereum Foundation Blog · Jun 256/101
💎

Solidity Storage Array Bugs

The article discusses bugs related to storage arrays in Solidity, the programming language used for Ethereum smart contracts. These bugs can lead to vulnerabilities in smart contract code that could potentially be exploited, affecting the security and reliability of decentralized applications.

CryptoBullishEthereum Foundation Blog · Feb 146/101
⛓️

Ethereum R&D Roundup: Valentine’s Day Edition

Ethereum core development teams are making significant progress on implementing the Metropolis hard fork after resolving previous security issues. The development work has resumed in full force over the past month and a half, building upon the progress made in the previous year.

$ETH
CryptoNeutralEthereum Foundation Blog · Nov 96/103
⛓️

Analysis of Storage Corruption Bug

A storage corruption bug discovered last week was found to be much less severe than initially believed. The small number of affected contracts are either only exploitable by owners or can only cause service disruptions rather than financial losses.

CryptoBullishEthereum Foundation Blog · Sep 16/102
⛓️

Dev Update: Formal Methods

Ethereum announces that Yoichi Hirai, a PhD holder from the University of Tokyo, is joining as a formal verification engineer. Hirai previously developed formal verification tools for Ethereum and specializes in formalizing communicating parallel processes.

$ETH
CryptoBearishEthereum Foundation Blog · Jul 226/102
⛓️

Hive: How we strived for a clean fork

The article discusses challenges faced during the DAO soft-fork attempt, highlighting underestimated side effects on the consensus protocol including DoS vulnerabilities and implementation data races. The rushed implementation introduced critical technical issues that posed significant risks to the network.

DeFiNeutralEthereum Foundation Blog · Jun 196/101
💎

Thinking About Smart Contract Security

A community-driven effort has compiled a comprehensive list of major Ethereum smart contract vulnerabilities, including the DAO hack and various smaller thefts ranging from 100-10,000 ETH. The analysis covers security flaws in games, token contracts, and other DeFi applications that have resulted in significant financial losses.

$ETH
CryptoNeutralEthereum Foundation Blog · Jun 105/101
⛓️

Smart Contract Security

Solidity development began in October 2014 before Ethereum had real-world testing, with early design decisions influenced by the Serpent language. The article discusses the evolution of smart contract security considerations as gas costs and network understanding have changed significantly since Solidity's inception.

$ETH
CryptoBullishEthereum Foundation Blog · Feb 176/102
⛓️

BTC Relay included in Ethereum Bounty Program

Martin Swende leads the Ethereum Bounty Program leaderboard following hacking activities at DEVCON1, with the latest bounty award being 5 BTC. The ongoing program remains open to anyone as BTC Relay prepares for its launch on Ethereum.

$BTC$ETH
CryptoNeutralEthereum Foundation Blog · Nov 95/102
⛓️

Stateful Turing-Complete Policies

The article discusses stateful Turing-complete policies as a solution to internet security challenges, particularly focusing on securing user accounts which have been a persistent problem over the past twenty years. It addresses issues with current password-based authentication systems where users manage hundreds of accounts across different websites.

CryptoNeutralEthereum Foundation Blog · Sep 145/101
⛓️

On Slow and Fast Block Times

The article examines the technical implications and security considerations of different blockchain block times, comparing networks with varying confirmation speeds like Bitcoin's 10-minute blocks versus faster alternatives with 17-second blocks. It explores how block time affects network security, transaction finality, and overall blockchain performance.

CryptoBearishEthereum Foundation Blog · Aug 206/102
⛓️

Security alert [consensus issue]

A consensus issue occurred on the Ethereum Frontier network at block 116,522 on August 20, 2015, involving a state database problem in geth that could lead to deletion of account data. The issue has been classified as high impact but has since been fixed.

CryptoNeutralEthereum Foundation Blog · Feb 146/104
⛓️

The Subjectivity / Exploitability Tradeoff

The article discusses the fundamental tradeoff between subjectivity and exploitability in consensus mechanisms. While consensus systems can be designed to resist attackers up to a certain threshold, they remain vulnerable to exploitation when attackers control sufficient resources, highlighting inherent security limitations in proof-of-work and other consensus architectures.

CryptoNeutralEthereum Foundation Blog · Nov 255/102
⛓️

Proof of Stake: How I Learned to Love Weak Subjectivity

The article discusses proof of stake consensus mechanisms, highlighting their benefits including improved efficiency, larger security margins, and immunity to hardware centralization. However, it notes that proof of stake algorithms are significantly more complex than proof of work systems.

CryptoBearishEthereum Foundation Blog · Feb 96/103
⛓️

Why Not Just Use X? An Instructive Example from Bitcoin

Bitcoin developer Gregory Maxwell discusses a design flaw in the Bitcoin protocol that allows third parties to mutate valid transactions while keeping them functionally identical but with different identifiers. This transaction malleability issue represents a significant technical vulnerability in Bitcoin's architecture.

$BTC
← PrevPage 20 of 26Next →