The Network, Attack, Attack!, Channel, Universal quantification, Money

Putting Pressure on Bitcoin’s Lightning Network Vulnerabilities Will Strengthen It

On Oct 28, 2020
@CoinDesk shared
[email protected] explores this topic in depth in part two of our series on Lightning Network vulnerabilities: https://t.co/1H09XvtOpu
Open

These vulnerabilities are reminders that improvements come with tradeoffs – and that security and useability are two sides of the same coin.

www.coindesk.com
On Oct 28, 2020
@CoinDesk shared
[email protected] explores this topic in depth in part two of our series on Lightning Network vulnerabilities: https://t.co/1H09XvtOpu
Open

Putting Pressure on Bitcoin’s Lightning Network Vulnerabilities Will Strengthen It

Putting Pressure on Bitcoin’s Lightning Network Vulnerabilities Will Strengthen It

These vulnerabilities are reminders that improvements come with tradeoffs – and that security and useability are two sides of the same coin.

Putting Pressure on Bitcoin’s Lightning Network Vulnerabilities Will Strengthen It

Putting Pressure on Bitcoin’s Lightning Network Vulnerabilities Will Strengthen It

These vulnerabilities are reminders that improvements come with trade-offs – and that security and usability are two sides of the same coin.

4 Bitcoin Lightning Network Vulnerabilities That Haven’t Been Exploited (Yet)

4 Bitcoin Lightning Network Vulnerabilities That Haven’t Been Exploited (Yet)

Over its two-year lifespan, Bitcoin’s Lightning Network developers have discovered a few vulnerabilities that haven't been exploited (yet).

News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and More

News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and More

From a cyberattack on Barnes & Noble to Zoom rolling out end-to-end encryption, Threatpost editors break down the top security stories of the week.

Let's Talk BItcoin! #390 Revisiting Lightning (Part 2)

Let's Talk BItcoin! #390 Revisiting Lightning (Part 2)

Adam B. Levine: Do you think this [collaboratively signing with someone else] solution is becoming more prevalent? You're effectively using coin-join as a way to create composite ...

Defense of the cyberrealm: How organizations can thwart cyberattacks

Defense of the cyberrealm: How organizations can thwart cyberattacks

Simon London speaks with McKinsey senior partner David Chinn and cybersecurity expert Robert Hannigan, formerly the head of GCHQ, about how to address the major gaps and vulnerabilities in ...

Elaborate Honeypot 'Factory' Network Hit with Ransomware, RAT, and Cryptojacking

Elaborate Honeypot 'Factory' Network Hit with Ransomware, RAT, and Cryptojacking

A fictitious industrial company with phony employees personas, website, and PLCs sitting on a simulated factory network fooled malicious hackers - and raised alarms for at least one ...

IoT devices are cybercriminals’ favourite targets – and attacks are skyrocketing

IoT devices are cybercriminals’ favourite targets – and attacks are skyrocketing

A snowballing number of IoT devices, combined with the prevalent use of tools such as Mirai and Eternal Blue, have lead to a surge in IoT cyberattacks.

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Earlier this year, Cybereason launched its latest honeypot to analyze the tactics, techniques, and procedures used by state-sponsored groups and cyber crime actors to target critical ...

Blockstream Rusty:The Commercialization of Lightning Network

Blockstream Rusty:The Commercialization of Lightning Network

Coinin recently launched the "Blockchain in Korea" series in South Korea, visiting the top blockchain practitioners in South Korea and promoting exchanges and cooperation between China and ...

From #reckless to Wumbology: Lightning Network’s Infrastructural Build Out

From #reckless to Wumbology: Lightning Network’s Infrastructural Build Out

Lightning Network’s infrastructural build-out was one of the most anticipated developments of the second half of 2018. Significant progress in both R&D and implementation has increased hype ...

Scott Adams talks with Naval Ravikant

Scott Adams talks with Naval Ravikant

On February 12, 2019, Scott Adams held a Periscope with Naval Ravikant. It’s available to view (or listen) on Periscope, podcast, and Youtube. It’s long, and wide-ranging. I listened when ...

Next Generation Tools: Deception Networks

Next Generation Tools: Deception Networks

There have been several predictions as to where adversary hacking is headed in the foreseeable future. Virtually all credible predictions have one thing