Samsung leaks images of cryptocurrency-enabled phone
First announced last month, this Galaxy S10 was expected--but the photos provide more details about how Samsung is approaching the cryptocurrency integration. A pre-loaded wallet called Samsung Blockchain Keystore is visible; the app's splash screen calls it the “secure and convenient place for your cryptocurrency.” Bitcoin, Ether, ERC-20 tokens, and Bitcoin Cash will be supported at launch. More details below.
Samsung Blockchain KeyStore confirmed by Galaxy S10 leaked images
"Our report mentioned that the cryptocurrency service would be split into two parts. There will be a cold wallet for saving digital currencies, public and private keys, and signing private keys for transactions. There’s also going to be a crypto wallet for viewing account information, transfers and transaction history."
Bitcoin Privacy Map
"A comprehensive illustration of important technical tools employed to improve Bitcoin's privacy feature."
Reaching Everyone, Pt. I: The Need For Sound Money Outside of the Wealthiest Territories
"The possibility of secure digital money has unbridled potential for both those living under authoritarian regimes, as well as those seeking to escape them. While it may take decades to see Bitcoin cannibalise fiat currencies, it already has great potential as a contender to them. A monetary system operating in parallel to a state-enforced one redistributes the power from the incumbent issuer to the population, and dampens the effectiveness of the state printing press."
Numerical simulation for upper bound on dynamic blocksize expansion
"The current bound on expansion of the Monero block(/chain) is that each block cannot be larger than the median size of the previous 100 blocks. Given the 2-minute block time, this means that the protocol has a few-hour memory, which performs well for most use cases and conditions. However, it is prudent to consider edge cases as well, and the current absence of medium or long-term memory comes with a significant risk. Under the current protocol, sustained high transaction volume (due to rapid adoption or a well-funded spammer) induces a rapid exponential increase in resource requirements (disk space, bandwidth, etc) that would exceed the capacities of the extant Monero infrastructure on the scale of hours"
Our Software Dependency Problem
"Software reuse is finally here, and I don’t mean to understate its benefits: it has brought an enormously positive transformation for software developers. Even so, we’ve accepted this transformation without completely thinking through the potential consequences. The old reasons for trusting dependencies are becoming less valid at exactly the same time we have more dependencies than ever. "
Last couple of weeks we have been spending a lot of time designing the @decredproject DAE. We feel that the design is adequate and in the next couple of weeks I’ll put up a formal proposal on how we think it’ll work. Exciting times...— Marco Peereboom (@marco_peereboom) January 15, 2019
“Fake Stake” attacks on chain-based Proof-of-Stake cryptocurrencies
"Many cryptocurrencies are in fact forks (or at least descendants) of Bitcoin’s codebase, with the PoS functionality grafted in. However, some design ideas are copied over insecurely, leading to new vulnerabilities that did not exist in the parent codebase. We call the vulnerabilities we found 'Fake Stake' attacks. Essentially, they work because PoSv3 implementations do not adequately validate network data before committing precious resources (disk and RAM). The consequence is that an attacker without much stake (in some cases none at all) can cause a victim node to crash by filling up its disk or RAM with bogus data. We believe that all currencies based on the UTXO and longest chain Proof-of-Stake model are vulnerable to these 'Fake Stake' attacks."
2019 will be the year of privacy
"2019 will be the year of privacy. The confluence of these three forces — increasing user awareness and concern, regulatory policy changes, and improved capabilities of privacy technologies — will bring privacy to the fore and usher in a new paradigm of privacy-first applications."
Millions of bank loan and mortgage documents have leaked online
"A trove of more than 24 million financial and banking documents, representing tens of thousands of loans and mortgages from some of the biggest banks in the U.S., has been found online after a server security lapse. The server, running an Elasticsearch database, had more than a decade’s worth of data, containing loan and mortgage agreements, repayment schedules and other highly sensitive financial and tax documents that reveal an intimate insight into a person’s financial life. But it wasn’t protected with a password, allowing anyone to access and read the massive cache of documents."