24 Matching Annotations
  1. Jun 2022
    1. CashFi’s native token, CFI, is an ERC20 token. Based on how the system is, CashFi (CFI) is more interested in Ethereum’s (ETH) developments as this affects its token.

      Cashfi is DEfi Cardano is smart contract provider

  2. May 2022
    1. protocols are a class of consensus mechanisms for blockchains that work by selecting validators in proportion to their quantity of holdings in the associated cryptocurrency. This is done to avoid the computational cost of proof of work schemes.

      Proof-of Stake (holding) Less energy consumption than Proof-of-work

    1. Issues in Ethereum smart contracts, in particular, include ambiguities and easy-but-insecure constructs in its contract language Solidity, compiler bugs, Ethereum Virtual Machine bugs, attacks on the blockchain network, the immutability of bugs and that there is no central source documenting known vulnerabilities, attacks and problematic constructs.

      SC ETHEREUM, Security issues

    2. The most popular blockchain for running smart contracts is Ethereum.[32] On Ethereum, smart contracts are typically written in a Turing-complete programming language called Solidity,[33] and compiled into low-level bytecode to be executed by the Ethereum Virtual Machine.[34] Due to the halting problem and other security problems, Turing-completeness is considered to be a risk and is deliberately avoided by languages like Vyper.[35][36] Some of the other smart contract programming languages missing Turing-completeness are Simplicity, Scilla, Ivy and Bitcoin Script.[36] However, measurements using regular expressions showed that only 35.3% of 53,757 Ethereum smart contracts included recursions and loops — constructs connected to the halting problem.[37]

      SMART CONTRACTS (SC) Ethereum BC SCs Turing complete: Solidity Turing incomplete: Vyper Simplicity Scilla Ivy Bitcoin script

    3. echnological means for the automation of payment obligations[

      Replacing e-NACH mandate in the banking system. Wallets will be deducted directly from

    4. reduction of need in trusted intermediators

      2 Smart Contract Key words

    5. transaction protocol which is intended to automatically execute

      1 Smart Contract Key words

    1. Uniswap UNI Exchange, Automated Market Making

      Uniswap DAO

    2. Inactive holders of governance tokens can be a major obstacle for DAO governance,[5] which has led to implementations of allowing voting power to be delegated to other parties.

      2nd DAO vulnerability

    3. The hack was reversed in the following weeks, and the money restored, via a hard fork of the Ethereum blockchain. Most Ethereum miners and clients switched to the new fork while the original chain became Ethereum Classic.

      Ethereum classic vs new fork Ethereum

    4. DAOs can be subject to coups or hostile takeovers that upend its voting structures especially if the voting power is based upon the number of tokens one owns. An example of this occurred in 2022, when Build Finance DAO suffered a coup in which one person amassed enough tokens to get a vote passed, then voted to give themselves full control of the DAO, then, using this power, they drained all of the money from the DAO.

      1st DAO Vulnerability

  3. Apr 2022
    1. One certainly revolves around the cryptographic keys. The cryptographic security we’re using today that was originated in the Bitcoin blockchain truly comes from 20-plus years of cryptographic research. This wasn’t just invented overnight. The way of securing data in a distributed database through these keys is pretty unique and certainly uses cutting-edge securities. That’s number one.

      Sector wise use of Blockchain

    2. When we did our research and looked across industries, we found fundamentally six different categories of business applications [Exhibit 2].

      Static vs trading uses of blockchain

    3. A lot of people have heard of blockchain but really don’t understand quite what it is. You hear everything, from everybody thinking that blockchain is Bitcoin or vice versa through to “it’s a ‘truth’ machine unto itself.”

      Myths of Blockchain

    1. Thus, the destiny of a supposedly decentralized currency may rest in the hands of one person — exactly the fate it was created to avoid.

      Craig Wright holds 1.1 million bitcoins. Huge concentration

    1. To this day blockchain has continued to evolve, in which now, blockchain 2.0 has emerged. With it, the ability to write software on top of the blockchain has been introduced, which can include anything from smart contracts to little apps.

      BLOCKCHAIN 2.0 - allows writing of software over it - like smart contracts, & other little apps

    2. All of this leads up to 2008 with Satoshi Nakamoto. Within the first installment of blockchain can be seen the influence of each of these cryptographers and researchers, including others that were not named.

      2008 - 6th instance of BLOCKCHAIN - SATOSHI NAKAMOTO - BITCOIN

    3. Three years later, 2005, Nick Szabo, a prolific cryptocurrency advocate and developer, would create another version of a simplified blockchain, and introduce it alongside his proto-cryptocurrency bit gold.

      2005 - 5th instance of BLOCKCHAIN - simplified blockchain - proto-cryptocurrency BIT GOLD

    4. One of the big developments for creating the blockchain occurred in 2002 when another pair of cryptographers named, David Mazières and Dennis Shasha, would propose a network file system with a decentralized trust. This was a proto-blockchain in that the writers to this file system would trust one another, but not the system itself. Instead they would digitally sign, with a SHA256 encryption or similar hashing function, commits and append it to a chain of others housed in a Merkel Tree

      2002 - 4th instance of BLOCKCHAIN - proto-blockchain - network file system, with decen trust, over MERKLE TREE

    5. 1991, where in a paper written by Stuart Haber & W. Scott Stornetta entitled, “How to Time-Stamp a Digital Document”, the concept of time stamping digital documents was proposed, to ensure transactions were ‘signed’ at a certain time. The following year, Haber & Stornetta, implemented a Merkle Tree, otherwise known as a hash tree, in each ‘block’ to store multiple transactions

      1991 - 1st instance of BLOCKCHAIN - Time stamp - Merkle Tree/Hash tree of blocks

    6. 1996, another cryptographer from Cambridge University, Ross Anderson, described in a paper, entitled “The Eternity Service”, a decentralized storage system with the inability to delete any updates made to the system. This was considered, at the time, a revolutionary paper on developing more secure peer-to-peer systems, which was directly inspired by the shutdown of the Finland’s penet remailer, by the Scientologists.

      1996 - 2nd instance of BLOCKCHAIN - "The Eternity Service". Inability to delete

    7. Two years later, B. Scheier & J. Kelsey would write a paper detailing another method to secure logs from untrusted machines using cryptography. In this paper, the Scheier & Kelsey describe a method in which computer can prevent attackers from modifying or tampering with any previous logs made, while at the same time making any logs unreadable to the an attacker

      1998 - 3rd instance of BLOCKCHAIN - logs made unreadable to an attacker

    1. How about these billions of connected smart things that will be sensing,responding, sharing data, generating and trading their own electricity,protecting our environment, managing our homes and our health

      What happens when "things" become smart? If my solar panel becomes smart, and is able to sell excess energy created to the grid, I am benefitted. But the solar panel will also need a code of its own, written by somebody. What happens when that code written for my "thing" turns out to be faulty, and instead of making gains, I lose and compromise?

    2. hat’s why we call it the Trust Protocol.It acts as a ledger of accounts, a database, a notary, a sentry and clearinghouse, all by consensus

      These are the basic tenets of blockchain technology and what we will explore further. Without these, there isn't much differentiation from the current form of internet.