Alireza
https://www.imdb.com/noscript/tt8618654/
Desertification of the soils
بیابان سازی زمین های کشاورزی و روند ضربه زدن کشاورزی صنعتی به سیستم زمین و ....
Poor lands leads to Poor people
Poor people leads to social breakdown
بیابان سازی زمین های کشاورزی و روند ضربه زدن کشاورزی صنعتی به سیستم زمین و ....
Poor lands leads to Poor people
Poor people leads to social breakdown
#research
#Ethereum
implementing python exec command Equivalent in EVM
(ببین آیا معماری EVM جایی تداخل داره با کلیت این داستان و اضافه کردن یه op code برای انجام دادن همچین چیزی یا نه )
اگه همچین چیزی رو بشه پیاده سازی کرد شکل upgradability قرارداد هوشمند ها به کلی عوض میشه ولی خطر هاش بیشتر از منفعتش میتونه باشه. 🤔😂
(exec
تو پایتون یه تابع هستش که یه استرینگ به عنوان ورودی. میگره و اون استرینگ میتونه کد پایتونی باشه یه چیزی مثل عکس و حالا چیزی که تو ذهنم هست داشتن یه opcode معادل توی EVM هستش که خود بایت کد و یا اسمبلی این لاین رو تو فورم استرینگ یه تابع دریافت کنه و بتونه تو کانتکست یه قرارداد اجراش کنه اون تیکه کد رو )
#Ethereum
implementing python exec command Equivalent in EVM
(ببین آیا معماری EVM جایی تداخل داره با کلیت این داستان و اضافه کردن یه op code برای انجام دادن همچین چیزی یا نه )
اگه همچین چیزی رو بشه پیاده سازی کرد شکل upgradability قرارداد هوشمند ها به کلی عوض میشه ولی خطر هاش بیشتر از منفعتش میتونه باشه. 🤔😂
(exec
تو پایتون یه تابع هستش که یه استرینگ به عنوان ورودی. میگره و اون استرینگ میتونه کد پایتونی باشه یه چیزی مثل عکس و حالا چیزی که تو ذهنم هست داشتن یه opcode معادل توی EVM هستش که خود بایت کد و یا اسمبلی این لاین رو تو فورم استرینگ یه تابع دریافت کنه و بتونه تو کانتکست یه قرارداد اجراش کنه اون تیکه کد رو )
Formal Analysis of Composable DeFi Protocols
In the field of DeFi, security audits often involve formal analysis, but usually focusing only on the verification of individual protocols. Yet, the “money-lego” structure of the DeFi ecosystem demands compositional analysis, which allows reasoning about the possible interplay between DeFi protocols and their impact on each other.
Communicating Sequential Process (CSP) [18] is a formal language for describing patterns of interaction for concurrent systems
https://arxiv.org/pdf/2103.00540.pdf
In the field of DeFi, security audits often involve formal analysis, but usually focusing only on the verification of individual protocols. Yet, the “money-lego” structure of the DeFi ecosystem demands compositional analysis, which allows reasoning about the possible interplay between DeFi protocols and their impact on each other.
Communicating Sequential Process (CSP) [18] is a formal language for describing patterns of interaction for concurrent systems
https://arxiv.org/pdf/2103.00540.pdf
Analysis of Bitcoin Vulnerability to Bribery Attacks
Launched Through Large Transactions
Suppose that Alice, who controls a minority of the com- putational power in the Bitcoin network, attempts to launch a double-spending attack against a seller whose name is Bob.
First, Alice does a large transaction with Bob.
After the transaction is included in the chain, Alice starts working on a fork by creating a block that does not include that transaction, but keeps this matter private.
Alice needs to create at least one block in her chain before the transaction is confirmed.
This block has some special transactions in which Alice transfers some BTC to new addresses she has created before.
After Alice’s transaction to Bob is confirmed (generally, in 6 blocks time), Bob sends Alice the purchased goods, and Alice releases her block(s) and tries to ”bribe” other miners to mine on her fork.
To do this, Alice discloses the private key(s) (of one or more) of the account(s) that she has transferred the money to in the block(s) she has just created. Rational miners who see the private key(s), may decide to work on Alice’s fork. They will create a new transaction to send the BTCs in the disclosed account to their accounts, and then try to create new blocks on Alice’s block. As soon as a miner finds a solution, Alice confirms it by disclosing the next private key.
If she manages to give sufficient incentives to attract enough mining power to her fork, the second branch will take over the main one and the transaction between Alice and Bob will be undone.
Unless Alice encourages other miners to work on her fork, she cannot hope for her attack to be successful, because she has a small fraction of the network computational power. If mining on Alice’s fork is deemed more profitable by rational miners, they will join Alice’s fork. She needs to keep convincing miners to mine on her fork, while making sure that the attack remains profitable for her at the end.
https://arxiv.org/pdf/2105.07501.pdf
Launched Through Large Transactions
Suppose that Alice, who controls a minority of the com- putational power in the Bitcoin network, attempts to launch a double-spending attack against a seller whose name is Bob.
First, Alice does a large transaction with Bob.
After the transaction is included in the chain, Alice starts working on a fork by creating a block that does not include that transaction, but keeps this matter private.
Alice needs to create at least one block in her chain before the transaction is confirmed.
This block has some special transactions in which Alice transfers some BTC to new addresses she has created before.
After Alice’s transaction to Bob is confirmed (generally, in 6 blocks time), Bob sends Alice the purchased goods, and Alice releases her block(s) and tries to ”bribe” other miners to mine on her fork.
To do this, Alice discloses the private key(s) (of one or more) of the account(s) that she has transferred the money to in the block(s) she has just created. Rational miners who see the private key(s), may decide to work on Alice’s fork. They will create a new transaction to send the BTCs in the disclosed account to their accounts, and then try to create new blocks on Alice’s block. As soon as a miner finds a solution, Alice confirms it by disclosing the next private key.
If she manages to give sufficient incentives to attract enough mining power to her fork, the second branch will take over the main one and the transaction between Alice and Bob will be undone.
Unless Alice encourages other miners to work on her fork, she cannot hope for her attack to be successful, because she has a small fraction of the network computational power. If mining on Alice’s fork is deemed more profitable by rational miners, they will join Alice’s fork. She needs to keep convincing miners to mine on her fork, while making sure that the attack remains profitable for her at the end.
https://arxiv.org/pdf/2105.07501.pdf
Hamid list
Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions Suppose that Alice, who controls a minority of the com- putational power in the Bitcoin network, attempts to launch a double-spending attack against a seller whose name…
مقاله خوبی بود و نویسنده هاش هم از دانشگاه تهران بودن 👀🧐👌
اما کاش اصلا سعی بر ارائه راه حل نمیکردن😶
اما کاش اصلا سعی بر ارائه راه حل نمیکردن😶
On the other hand, recent developments in distributed ledger technology (DLT) draw together cryptography/computer science, complex systems science, and information systems (IS) to explore “cryptoeconomic systems” (CES) incentivizing human behaviour (Voshmgir and Zargham 2019a).
Forwarded from Amirhossein Hassaneini
پیشنهاد من اینه که در حد اجرای یک MVP فعلا درگیر این نشین. فرض کنید سه تا قابلیت ساخت، پرداخت و چک کردن وضعیت اینویس رو در اختیار دارید و ایدهتون رو پیاده کنید. بعدش خدا بزرگه.
من تجربه کار با api های btcpayserver و lnd رو دارم. btcpayserver ستاپش اولیهاش یه خورده برای php دنگ و فنگ داشت. lnd و python راحتتر بود، مستندات خوبی داره. lightning-charge هم یه rest شسته رفته میده خوبه، ولی c-lightning میخواد.
اینجا رو یه نگاه بنداز:
https://github.com/bcongdon/awesome-lightning-network
من تجربه کار با api های btcpayserver و lnd رو دارم. btcpayserver ستاپش اولیهاش یه خورده برای php دنگ و فنگ داشت. lnd و python راحتتر بود، مستندات خوبی داره. lightning-charge هم یه rest شسته رفته میده خوبه، ولی c-lightning میخواد.
اینجا رو یه نگاه بنداز:
https://github.com/bcongdon/awesome-lightning-network
GitHub
GitHub - bcongdon/awesome-lightning-network: ⚡ A curated list of awesome Lightning Network projects for developers and crypto enthusiasts
⚡ A curated list of awesome Lightning Network projects for developers and crypto enthusiasts - bcongdon/awesome-lightning-network
Hamid list
https://www.youtube.com/watch?v=2My8irYKqR0&list=PLbZsVFe0OMEZKXpZjYaUYAaNfsqpk5Bl1&index=6
Data localization VS طرح صیانت از اینترنت
Forwarded from خشتِ خام | حسین دهباشی (تاریخ آنلاین)
افغانستان و روزهای سقوط.pdf
6.3 MB
در ۱۷مرداد۱۳۷۷ دوازده دیپلمات و یک خبرنگارایرانی در مزارشریف افغانستان به شکل فجیعی به شهادت رسیدند. این کتاب یادداشتهای حسیندهباشی از آن ایام است.
Channel | @iranoralhistory
Channel | @tarikhonline
Channel | @iranoralhistory
Channel | @tarikhonline
https://www.stacks.co/technology
The Clarity design
One programming language. No compiler, no assemly, no bytecode.
Source code is interpreted on chain. What you see is what you get.
The Clarity design
One programming language. No compiler, no assemly, no bytecode.
Source code is interpreted on chain. What you see is what you get.
www.stacks.co
Stacks Features and Possibilities
Learn what's possible with Stacks and how the technology enables it.
proof of transfer -> block stack
https://uploads-ssl.webflow.com/5fcf9ac604d37418aa70a5ab/60072dbb32d416d6b3806935_5f1596b12bcc0800f3dcadcd_pox.pdf
https://uploads-ssl.webflow.com/5fcf9ac604d37418aa70a5ab/60072dbb32d416d6b3806935_5f1596b12bcc0800f3dcadcd_pox.pdf
نمیدونم چرا مقاومت میکنه بگه که یه chain جدا هستش🤔
و توی تبلغاتشجوری میگه انگار به خود بیتکوین یک چیزی اضافه کردن و ...
https://gaia.blockstack.org/hub/1AxyPunHHAHiEffXWESKfbvmBpGQv138Fp/stacks.pdf
و توی تبلغاتشجوری میگه انگار به خود بیتکوین یک چیزی اضافه کردن و ...
https://gaia.blockstack.org/hub/1AxyPunHHAHiEffXWESKfbvmBpGQv138Fp/stacks.pdf