Formal Analysis of Composable DeFi Protocols
In the field of DeFi, security audits often involve formal analysis, but usually focusing only on the verification of individual protocols. Yet, the “money-lego” structure of the DeFi ecosystem demands compositional analysis, which allows reasoning about the possible interplay between DeFi protocols and their impact on each other.
Communicating Sequential Process (CSP) [18] is a formal language for describing patterns of interaction for concurrent systems
https://arxiv.org/pdf/2103.00540.pdf
In the field of DeFi, security audits often involve formal analysis, but usually focusing only on the verification of individual protocols. Yet, the “money-lego” structure of the DeFi ecosystem demands compositional analysis, which allows reasoning about the possible interplay between DeFi protocols and their impact on each other.
Communicating Sequential Process (CSP) [18] is a formal language for describing patterns of interaction for concurrent systems
https://arxiv.org/pdf/2103.00540.pdf
Analysis of Bitcoin Vulnerability to Bribery Attacks
Launched Through Large Transactions
Suppose that Alice, who controls a minority of the com- putational power in the Bitcoin network, attempts to launch a double-spending attack against a seller whose name is Bob.
First, Alice does a large transaction with Bob.
After the transaction is included in the chain, Alice starts working on a fork by creating a block that does not include that transaction, but keeps this matter private.
Alice needs to create at least one block in her chain before the transaction is confirmed.
This block has some special transactions in which Alice transfers some BTC to new addresses she has created before.
After Alice’s transaction to Bob is confirmed (generally, in 6 blocks time), Bob sends Alice the purchased goods, and Alice releases her block(s) and tries to ”bribe” other miners to mine on her fork.
To do this, Alice discloses the private key(s) (of one or more) of the account(s) that she has transferred the money to in the block(s) she has just created. Rational miners who see the private key(s), may decide to work on Alice’s fork. They will create a new transaction to send the BTCs in the disclosed account to their accounts, and then try to create new blocks on Alice’s block. As soon as a miner finds a solution, Alice confirms it by disclosing the next private key.
If she manages to give sufficient incentives to attract enough mining power to her fork, the second branch will take over the main one and the transaction between Alice and Bob will be undone.
Unless Alice encourages other miners to work on her fork, she cannot hope for her attack to be successful, because she has a small fraction of the network computational power. If mining on Alice’s fork is deemed more profitable by rational miners, they will join Alice’s fork. She needs to keep convincing miners to mine on her fork, while making sure that the attack remains profitable for her at the end.
https://arxiv.org/pdf/2105.07501.pdf
Launched Through Large Transactions
Suppose that Alice, who controls a minority of the com- putational power in the Bitcoin network, attempts to launch a double-spending attack against a seller whose name is Bob.
First, Alice does a large transaction with Bob.
After the transaction is included in the chain, Alice starts working on a fork by creating a block that does not include that transaction, but keeps this matter private.
Alice needs to create at least one block in her chain before the transaction is confirmed.
This block has some special transactions in which Alice transfers some BTC to new addresses she has created before.
After Alice’s transaction to Bob is confirmed (generally, in 6 blocks time), Bob sends Alice the purchased goods, and Alice releases her block(s) and tries to ”bribe” other miners to mine on her fork.
To do this, Alice discloses the private key(s) (of one or more) of the account(s) that she has transferred the money to in the block(s) she has just created. Rational miners who see the private key(s), may decide to work on Alice’s fork. They will create a new transaction to send the BTCs in the disclosed account to their accounts, and then try to create new blocks on Alice’s block. As soon as a miner finds a solution, Alice confirms it by disclosing the next private key.
If she manages to give sufficient incentives to attract enough mining power to her fork, the second branch will take over the main one and the transaction between Alice and Bob will be undone.
Unless Alice encourages other miners to work on her fork, she cannot hope for her attack to be successful, because she has a small fraction of the network computational power. If mining on Alice’s fork is deemed more profitable by rational miners, they will join Alice’s fork. She needs to keep convincing miners to mine on her fork, while making sure that the attack remains profitable for her at the end.
https://arxiv.org/pdf/2105.07501.pdf
Hamid list
Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions Suppose that Alice, who controls a minority of the com- putational power in the Bitcoin network, attempts to launch a double-spending attack against a seller whose name…
مقاله خوبی بود و نویسنده هاش هم از دانشگاه تهران بودن 👀🧐👌
اما کاش اصلا سعی بر ارائه راه حل نمیکردن😶
اما کاش اصلا سعی بر ارائه راه حل نمیکردن😶
On the other hand, recent developments in distributed ledger technology (DLT) draw together cryptography/computer science, complex systems science, and information systems (IS) to explore “cryptoeconomic systems” (CES) incentivizing human behaviour (Voshmgir and Zargham 2019a).
Forwarded from Amirhossein Hassaneini
پیشنهاد من اینه که در حد اجرای یک MVP فعلا درگیر این نشین. فرض کنید سه تا قابلیت ساخت، پرداخت و چک کردن وضعیت اینویس رو در اختیار دارید و ایدهتون رو پیاده کنید. بعدش خدا بزرگه.
من تجربه کار با api های btcpayserver و lnd رو دارم. btcpayserver ستاپش اولیهاش یه خورده برای php دنگ و فنگ داشت. lnd و python راحتتر بود، مستندات خوبی داره. lightning-charge هم یه rest شسته رفته میده خوبه، ولی c-lightning میخواد.
اینجا رو یه نگاه بنداز:
https://github.com/bcongdon/awesome-lightning-network
من تجربه کار با api های btcpayserver و lnd رو دارم. btcpayserver ستاپش اولیهاش یه خورده برای php دنگ و فنگ داشت. lnd و python راحتتر بود، مستندات خوبی داره. lightning-charge هم یه rest شسته رفته میده خوبه، ولی c-lightning میخواد.
اینجا رو یه نگاه بنداز:
https://github.com/bcongdon/awesome-lightning-network
GitHub
GitHub - bcongdon/awesome-lightning-network: ⚡ A curated list of awesome Lightning Network projects for developers and crypto enthusiasts
⚡ A curated list of awesome Lightning Network projects for developers and crypto enthusiasts - bcongdon/awesome-lightning-network
Hamid list
https://www.youtube.com/watch?v=2My8irYKqR0&list=PLbZsVFe0OMEZKXpZjYaUYAaNfsqpk5Bl1&index=6
Data localization VS طرح صیانت از اینترنت
Forwarded from خشتِ خام | حسین دهباشی (تاریخ آنلاین)
افغانستان و روزهای سقوط.pdf
6.3 MB
در ۱۷مرداد۱۳۷۷ دوازده دیپلمات و یک خبرنگارایرانی در مزارشریف افغانستان به شکل فجیعی به شهادت رسیدند. این کتاب یادداشتهای حسیندهباشی از آن ایام است.
Channel | @iranoralhistory
Channel | @tarikhonline
Channel | @iranoralhistory
Channel | @tarikhonline
https://www.stacks.co/technology
The Clarity design
One programming language. No compiler, no assemly, no bytecode.
Source code is interpreted on chain. What you see is what you get.
The Clarity design
One programming language. No compiler, no assemly, no bytecode.
Source code is interpreted on chain. What you see is what you get.
www.stacks.co
Stacks Features and Possibilities
Learn what's possible with Stacks and how the technology enables it.
proof of transfer -> block stack
https://uploads-ssl.webflow.com/5fcf9ac604d37418aa70a5ab/60072dbb32d416d6b3806935_5f1596b12bcc0800f3dcadcd_pox.pdf
https://uploads-ssl.webflow.com/5fcf9ac604d37418aa70a5ab/60072dbb32d416d6b3806935_5f1596b12bcc0800f3dcadcd_pox.pdf
نمیدونم چرا مقاومت میکنه بگه که یه chain جدا هستش🤔
و توی تبلغاتشجوری میگه انگار به خود بیتکوین یک چیزی اضافه کردن و ...
https://gaia.blockstack.org/hub/1AxyPunHHAHiEffXWESKfbvmBpGQv138Fp/stacks.pdf
و توی تبلغاتشجوری میگه انگار به خود بیتکوین یک چیزی اضافه کردن و ...
https://gaia.blockstack.org/hub/1AxyPunHHAHiEffXWESKfbvmBpGQv138Fp/stacks.pdf
Forwarded from هسامم
برنده هکاتون impervious
https://www.theworldcomputer.com/
https://www.theworldcomputer.com/
Theworldcomputer
theworldcomputer.com - This website is for sale! - theworldcomputer Resources and Information.
This website is for sale! theworldcomputer.com is your first and best source for all of the information you’re looking for. From general topics to more of what you would expect to find here, theworldcomputer.com has it all. We hope you find what you are searching…
اینجا بنویسم شاید به درد کسی بخوره
#tron
نیاز داشتم یک سری دیتا مربوط به شبکه منحوس ترون رو بخونم 😂
و حوصله هم نداشتم برم ببینم gate way دریافت اون دیتا توی نود های ترون چی هستش (با توجه به اون دیتا مورد نیازم هم مجبور بودم با احتمال زیاد از چند تا gate way مختلف دیتا بگیرم و با ترکیب کردن اون دیتا و یه تحلیل نیمچه نیمه روشون چیزی که میخواستم رو به دست بیارم)
اما قبلا دیده بودم که روی tron scan اون دیتا بودش و با خودم گفتم ایول میرم از api هاش استفاده میکنم
اما در کمال تعجب خودش صفحه ای برای ارائه api هاش نداشت 😐 و اونجا با خودم گفتم جهنم با beautifulsoup و پایتون خودم میرم میخونمش و ...
در همین حین بود که گفتم بزار یه لحظه network رو چک کنم ببینم خودش ترون اسکن با بک اندشون چجوری حرف میزنه و بله اونجا api هاشون رو پیدا کردم
apilist.tronscan.org
اند پوینت هاشون رو هم وقتی inspect element رو باز کردید برید توی source و اون دایرکتوری ای که باز کردم اونجا میتونید پیدا کنید)البته توی خود وب اپلیکیشنش هم یه بار اون دیتا کالکت بشه تا اینجا بتونید ببینیدش دیگه)
#tron
نیاز داشتم یک سری دیتا مربوط به شبکه منحوس ترون رو بخونم 😂
و حوصله هم نداشتم برم ببینم gate way دریافت اون دیتا توی نود های ترون چی هستش (با توجه به اون دیتا مورد نیازم هم مجبور بودم با احتمال زیاد از چند تا gate way مختلف دیتا بگیرم و با ترکیب کردن اون دیتا و یه تحلیل نیمچه نیمه روشون چیزی که میخواستم رو به دست بیارم)
اما قبلا دیده بودم که روی tron scan اون دیتا بودش و با خودم گفتم ایول میرم از api هاش استفاده میکنم
اما در کمال تعجب خودش صفحه ای برای ارائه api هاش نداشت 😐 و اونجا با خودم گفتم جهنم با beautifulsoup و پایتون خودم میرم میخونمش و ...
در همین حین بود که گفتم بزار یه لحظه network رو چک کنم ببینم خودش ترون اسکن با بک اندشون چجوری حرف میزنه و بله اونجا api هاشون رو پیدا کردم
apilist.tronscan.org
اند پوینت هاشون رو هم وقتی inspect element رو باز کردید برید توی source و اون دایرکتوری ای که باز کردم اونجا میتونید پیدا کنید)البته توی خود وب اپلیکیشنش هم یه بار اون دیتا کالکت بشه تا اینجا بتونید ببینیدش دیگه)