Technology Recap: Bitcoin: Several wallet developers including ColdCard and Sparrow Wallet have been in talks with developer Ali Sherief regarding a BIP that encompasses a single message signing algorithm used for P2WPKH and other output types. Core developers have been discussing use cases and designs around on-chain transactions that “burn” bitcoins in small increments as a proof of resource…
Technology Recap: Bitcoin: Core Developer Alfred Hodler posted to the Bitcoin-Dev mailing list a proposal to BIP-47. BIP-47 allows a user to publish a payment code that anyone can use in combination with their own keys to create an unlimited number of private addresses that only the two know, aiming to avoid address reuse issues. Ethereum: Tim…
Technology Recap: Bitcoin: Lightning Network Daemon, lnd, announces lnd v0.15-beta! This new release includes full support for Taproot (creating addresses, send/receive, PSBT funding and signing), experimental MuSig2 API, BIP-55 support for neutrino and more! The Lightning Development Kit shares the full background of LDK and the advantages of using LDK for Lightning network development. Ethereum: The Gray Glacier upgrade is scheduled…
Ransomware continues to be a major cybersecurity challenge that impacts us all – from big industry to small businesses to individuals. In 2021, we analyzed trends in ransomware usage and bottled those up in our latest Current Trends in Ransomware Report. Here’s a snapshot of what you’ll find in the report: Double extortion ransomware increased…
On August 18, hackers stole a little over $90M* in more than 69 different cryptocurrencies and tokens from Japan-based exchange Liquid Global. Liquid’s teams have yet to release a postmortem detailing the attack vector used by the hacker. While about $16 million in assets from more centralized tokens have already been frozen according to Liquid,… Read more
Standoff between Poly Network and Hacker over keys to multisig wallet Aug 18 Update: In an August 17 Medium article, the Poly Network team announced that they had offered the hacker, whom they refer to as “Mr. White Hat,” the position of Chief Security Officer along with a $500,000 bounty for identifying the exploit. In… Read more
In the wake of the Colonial Pipeline and JBS hacks, cybercrime and ransomware attacks continue to be top of mind for global corporations. As consumer purchasing moved to online transactions (digital trade) during the COVID-19 pandemic, the incidence of cybercrime also grew. FBI Director Christopher Wray recently compared the bureau’s shift to global ransomware threats…
TL;DR: Iron.Finance depends on arbitrage as their stabilizing mechanism for partially collateralized tokens. In the case of the TITAN token collapse, the time frame between its price feed oracle and the actual real-time prices of the market was too large causing users to become unprofitable and not protect the stabilization. As a result, TITAN dropped…
On April 13, 2021, the Cloud Security Alliance (CSA) Blockchain/Distributed Ledger Working Group released the Crypto-Asset Exchange Security Guidelines—a set of guidelines and best practices for crypto-asset exchange (CaE) security. The set of guidelines were created to help educate users, policymakers, and cybersecurity professionals on the pros and cons of further securing Virtual Asset Service…
Stefan Thomas is two failed password attempts away from losing the private keys to $220 million worth of bitcoin forever. This is because Thomas holds the private keys to his bitcoin wallet in an IronKey. “The World’s Most Secure Flash Drive” would rather die than give up its secrets, thanks to a series of built-in…