Wrecking sandwich traders for fun and profit
https://github.com/Defi-Cartel/salmonella [github.com]
2021-03-19 18:19
tags:
blockchain
finance
programming
security
However, nothing is risk-free on the blockchain, and exploitative trading strategies such as sandwich trading and front-running actually increase in risk the more the engineer attempts to generalise their ability to capture opportunities.
To illustrate to novice traders the risks of playing in the mempool, I have conducted a demonstration of a new trading alpha I call “Salmonella”, which involves intentionally exploiting the generalised nature of front-running setups. The goal of sandwich trading is to exploit the slippage of unintended victims, so this strategy turns the tables on the exploiters.
source: HN
Baby Sharks - Injecting small order points to threshold EdDSA
https://medium.com/zengo/baby-sharks-a3b9ceb4efe0 [medium.com]
2020-12-11 07:03
tags:
blockchain
crypto
math
security
We showcase one example of how an attacker can inject a low order subgroup group element in threshold EdDSA protocol secure against malicious adversaries, bypassing existing protections.
source: green
Ethereum is a Dark Forest
https://medium.com/@danrobinson/ethereum-is-a-dark-forest-ecc5f0505dff [medium.com]
2020-08-28 20:22
tags:
blockchain
cloud
finance
security
In the Ethereum mempool, these apex predators take the form of “arbitrage bots.” Arbitrage bots monitor pending transactions and attempt to exploit profitable opportunities created by them. No white hat knows more about these bots than Phil Daian, the smart contract researcher who, along with his colleagues, wrote the Flash Boys 2.0 paper and coined the term “miner extractable value” (MEV).
Phil once told me about a cosmic horror that he called a “generalized frontrunner.” Arbitrage bots typically look for specific types of transactions in the mempool (such a DEX trade or an oracle update) and try to frontrun them according to a predetermined algorithm. Generalized frontrunners look for any transaction that they could profitably frontrun by copying it and replacing addresses with their own. They can even execute the transaction and copy profitable internal transactions generated by its execution trace.
source: HN
Man who tokenized himself on Ethereum becomes AI deepfake
https://decrypt.co/29070/ethereum-tokenized-man-becomes-synthetic-deepfake [decrypt.co]
2020-05-17 03:43
tags:
ai
blockchain
hoipolloi
Ethereum’s tokenized man just became a synthetic deepfake—and you can decide what he says for $99.
source: MR
Ethercombing: Finding Secrets in Popular Places
https://www.securityevaluators.com/casestudies/ethercombing/ [www.securityevaluators.com]
2019-04-24 22:10
tags:
auth
blockchain
finance
hoipolloi
random
In this paper we examine how, even when faced with this statistical improbability, ISE discovered 732 private keys as well as their corresponding public keys that committed 49,060 transactions to the Ethereum blockchain. Additionally, we identified 13,319 Ethereum that was transferred to either invalid destination addresses, or wallets derived from weak keys that at the height of the Ethereum market had a combined total value of $18,899,969. In the process, we discovered that funds from these weak-key addresses are being pilfered and sent to a destination address belonging to an individual or group that is running active campaigns to compromise/gather private keys and obtain these funds. On January 13, 2018, this “blockchainbandit” held a balance of 37,926 ETH valued at $54,343,407.
In an experiment, we picked a private key of 1, for no reason other than that it is the lower bound of a possible private key for secp256k1 and it also lies within the 1 to 232-1 range of a 32-bit truncated key. We use the private key 0x0000000000000000000000000000000000000000000000000000000000000001 to derive the public Ethereum address 0x7e5f4552091a69125d5dfcb7b8c2659029395bdf.
source: ML
RandomX
https://github.com/tevador/RandomX [github.com]
2019-04-11 00:56
tags:
blockchain
hash
random
Proof of work algorithm based on random code execution
source: solar
Opera introduces Reborn 3, the first desktop browser with Web 3, faster VPN and ad blocker
https://blogs.opera.com/desktop/2019/04/opera-60-reborn-3-web-3-0-vpn-ad-blocker/ [blogs.opera.com]
2019-04-09 14:39
tags:
blockchain
browser
release
web
Opera now also includes Web 3-support and a Crypto Wallet, an important new feature. It allows you to browse and make transactions the blockchain-based Internet of the future, also known as Web 3. This makes Opera the first ever Web 3-ready computer browser.
Here we go....
source: HN
A Deep Dive on RSA Accumulators
https://blog.goodaudience.com/deep-dive-on-rsa-accumulators-230bc84144d9?gi=1a9b59a8bede [blog.goodaudience.com]
2019-03-11 06:46
tags:
blockchain
crypto
hash
math
security
Accumulators are a topic of interest in academia since 1994. Similarly to a Merkle Tree, they are used to cryptographically commit to the knowledge of a set of data. At a later point in time, proving membership of a subset of the dataset in the dataset can be proven by publishing a proof. In Merkle Trees the proof is called a Merkle Branch (or Merkle Proof), and grows logarithmically to the size of the committed data (commit 16 elements, prove inclusion by revealing log_2(16)=4).
Accumulators on the other hand, allow proving membership in constant size, as well as batching of proofs for multiple elements (which is not a feature of Merkle trees).
The focus of this post will be on describing the building blocks of RSA Accumulators, how we can construct proofs of (non-)membership as well as batch them across multiple blocks. This particular technique also has applications in UTXO-Based Plasma, and has given birth to the Plasma Prime variant. A lot of effort is being put into designing an accumulator that allows compaction of the UTXO-set in Plasma.
source: green
Vitalik Buterin on Cryptoeconomics and Markets in Everything
https://medium.com/conversations-with-tyler/vitalik-buterin-tyler-cowen-cryptocurrency-blockchain-tech-3a2b20c12c97 [medium.com]
2018-07-20 00:30
tags:
blockchain
finance
interview
At the intersection of programming, economics, cryptography, distributed systems, information theory, and math, you will find Vitalik Buterin, who has managed to synthesize insights across those fields into successful, real-world applications like Ethereum, which aims to decentralize the Internet.
Tyler sat down with Vitalik to discuss the many things he’s thinking about and working on, including the nascent field of cryptoeconomics, the best analogy for understanding the blockchain, his desire for more social science fiction, why belief in progress is our most useful delusion, best places to visit in time and space, how he picks up languages, why centralization’s not all bad, the best ways to value crypto assets, whether P = NP, and much more.
source: MR
The Verge Hack, Explained
https://blog.theabacus.io/the-verge-hack-explained-7942f63a3017 [blog.theabacus.io]
2018-05-22 20:39
tags:
blockchain
development
hash
security
turtles
In both cases, this hack presents a strong argument for tending towards sticking to things proven to work and to be wary of overcomplicating things and thereby introducing unnecessary risks when people’s financial assets are involved.
When more is less.
source: L
Do You Take Sweatcoin?
https://www.newyorker.com/magazine/2018/04/02/do-you-take-sweatcoin [www.newyorker.com]
2018-04-01 01:28
tags:
blockchain
essay
finance
hoipolloi
life
Hoping to convert his daily constitutional into cash, a correspondent recently amassed more than a hundred sweatcoins by walking around New York, and then investigated what he could reap from his labors. At the Gap, when a clerk ringing up the correspondent’s purchase asked, “Do you have a Gap card?,” the correspondent said, “No, but I have sweatcoin.” The clerk furrowed his brow and demanded legitimate currency. A cashier at Astor Place Hairstylists was impressed by the concept, when it was explained to him (“Sounds like a million-dollar idea”), but was unwilling to accept sweatcoins as payment for a haircut.
Is VIX Manipulated or Hedged?
https://www.bloomberg.com/view/articles/2018-02-14/is-vix-manipulated-or-hedged [www.bloomberg.com]
2018-02-24 02:11
tags:
blockchain
business
finance
hoipolloi
Also Uber drivers, financial technology, Fannie and Freddie and a crypto tween.
I feel like “financial literacy” as it is usually conceived is terrible, just a lot of “if your bank pays 10 percent compound interest and you start with $100 then in three years will you have more or less than $130?” and other arithmetic trivia that is of limited interest in our world of low interest rates and flourishing Ponzi schemes. “Financial literacy” will tell you that the answer is “more than $130,” because compound interest Einstein blah blah blah, but the correct answer is “less than $130,” and likely zero, because if your bank pays you 10 percent interest in the United States in 2018 it is a Ponzi and will steal your money.
Like here is a financial-literacy quiz: Are these companies? If you get at least five of those right then I will allow you to drive for Uber.
A fantastic money stuff.
source: ML
Bitcoin has a huge scaling problem — Lightning could be the solution
https://arstechnica.com/tech-policy/2018/02/bitcoins-lightning-network-a-deep-dive/ [arstechnica.com]
2018-02-08 02:19
tags:
blockchain
hash
networking
So, what’s on the horizon as bitcoin prepares for Lightning to strike? To truly understand, it’s important to first understand how Lightning uses the cryptographic primitives of the bitcoin network to make secure payments outside the blockchain (you’re in luck—we’ll explain). From there, we’ll take a step back and consider the key strengths and weaknesses that the new network is likely to have once it’s deployed at scale.
Okay, so Bitcoin.
https://twitter.com/BryceElder/status/959770192107601920 [twitter.com]
2018-02-07 02:49
tags:
blockchain
essay
hash
tweet
web
It was invented by Satoshi Nakamoto, a developer at Nintendo who mysteriously disappeared in the 1990s. The multiplayer mode in Goldeneye N64, on which he was lead developer, uses a primitive form of Bitcoin to keep track of high scores.
Predicting Random Numbers in Ethereum Smart Contracts
https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620 [blog.positive.com]
2018-02-07 02:43
tags:
blockchain
programming
random
Secure PRNG implementation in the Ethereum blockchain remains a challenge.
source: green
Blockchains: How to Steal Millions in 2^64 Operations
https://research.kudelskisecurity.com/2018/01/16/blockchains-how-to-steal-millions-in-264-operations/ [research.kudelskisecurity.com]
2018-01-18 17:44
tags:
blockchain
exploit
hash
security
TL;DR: you can hijack certain Lisk accounts and steal all their balance after only 2^64 evaluations of the address generation function (a combination of SHA-256, SHA-512, and a scalar multiplication over Ed25519’s curve).
source: green
Decentralization in Bitcoin and Ethereum
http://hackingdistributed.com/2018/01/15/decentralization-bitcoin-ethereum/ [hackingdistributed.com]
2018-01-16 14:07
tags:
blockchain
networking
paper
We have been conducting a longitudinal study of the state of cryptocurrency networks, including Bitcoin and Ethereum. We have just made public our results from our study spanning 2015 to 2017, in a peer-reviewed paper about to be presented at the upcoming Financial Cryptography and Data Security conference in February.
Here are some highlights from our findings.
source: green
Scalable, transparent, and post-quantum secure computational integrity
https://eprint.iacr.org/2018/046 [eprint.iacr.org]
2018-01-12 06:53
tags:
blockchain
compsci
crypto
paper
pdf
security
Here we report the first realization of a transparent ZK system (ZK-STARK) in which verification scales exponentially faster than database size, and moreover, this exponential speedup in verification is observed concretely for meaningful and sequential computations, described next. Our system uses several recent advances on interactive oracle proofs (IOP), such as a “fast” (linear time) IOP system for error correcting codes.
source: green
The blockchain paradox: Why distributed ledger technologies may do little to transform the economy
https://www.oii.ox.ac.uk/blog/the-blockchain-paradox-why-distributed-ledger-technologies-may-do-little-to-transform-the-economy/ [www.oii.ox.ac.uk]
2017-12-30 18:49
tags:
blockchain
finance
ideas
And this leads me to my final point, a provocation: once you address the problem of governance, you no longer need blockchain; you can just as well use conventional technology that assumes a trusted central party to enforce the rules, because you’re already trusting somebody (or some organization/process) to make the rules.
source: L
Ten years in, nobody has come up with a use for blockchain
https://hackernoon.com/ten-years-in-nobody-has-come-up-with-a-use-case-for-blockchain-ee98c180100 [hackernoon.com]
2017-12-29 22:33
tags:
blockchain
finance
What if, ten years after it was invented, the reason nobody has adopted a distributed ledger at scale is because nobody wants it?
That’s just, like, your opinion, man.
source: MR