Security The Ethereum DAO Hack (2016) - Case Study 2 Welcome back to the series, this is the second case study of the series where I explore and analyze some of the most spectacular bugs and exploits of the blockchain
Blockchain The most spectacular exploits and bugs in the blockchain space - Case Study 1 The blockchain paradigm as we know it today has been around for slightly more than a decade, during that time period we have seen a number of exploits and bugs
Applied Cryptography The Cryptography of P2P Transfer Systems One of the things I find fascinating about current P2P transfer systems, like Bitcoin for instance, it's the technology behind the actual transfer, not only it's
Blockchain Proof Of Work Algorithm : Explained If you have been following the blockchain space you have probably heard of the term proof of work. In this article I will try to explain the concept both theoretically