Learn the differences between the colloquially accepted meaning of different proofs within the cryptocurrency world of Bitcoin, Ethereum and then some. This article aims to deliver a basic understanding of the following proofs and the nature around its observance. For all reasons unless explicitly specified, we shall refer to the oldest cryptocurrency in use, Bitcoin.… Read More

I started looking into DNS Rebinding, but all the articles were mainly pretty old. Then I asked about it in Bug Bounty Forum and Luke Young linked me his awesome Defcontalk about modern DNS rebinding exploitation. It also included an automated tool to make DNS rebinding achievable on most of the modern browsers. Source: wordpress… Read More

Decentralized applications (dApps) are becoming increasingly interesting to developers around the world. Unlike traditional applications built on platforms like iOS and Android, dApps connect users and developers directly without the need for a middleman to host and manage the code and user data. Permission is not needed to build a dApp and there is no… Read More

Last week we mentioned the double-spend problem, which arises when Alice tries to spend her money more than once. In this post, which will be the last in the series, we show how this problem is resolved in the Tangle, and how we decide which history is the valid one. Source: iota… Read More

New data published on Feb. 16 and Feb. 23 by China State Intellectual Property Office (SIPO) highlights the efforts by institutions such as Zhejiang University, Shenzhen University and Chinese Academy of Sciences to obtain patents related to the tech. The efforts are a tangible sign of the growing interest – and investment of resources –… Read More