In a previous post (Trustless, Noncustodial Exchange Prototype), we already mentioned Merkle trees and their use in the exchange protocol we’re building with the OAX Foundation. Today we will go deeper into the subject, highlightling how easy it is to introduce security flaws when instantiating this seemingly simple cryptographic primitive.
In an era of instant payments, blockchain transactions seem like a steep step back in usability in many ways. Unlike traditional payment methods, blockchain transactions are not immediately finalized. This delay in payment completion, known as delayed finality, is an important concept weaved into the very foundation of the blockchain that deserves closer examination.
About a month ago the OAX Foundation and Enuma Technologies released a prototype SDK of our trustless exchange prototype. In this post we would like to provide a accessible overview of the technology behind it.
We present some of the perils of working with
bignumber.jsand how to mitigate them.
This is Part 1 in a series of articles on Whisper, Ehtereum’s inter-application communication protocol. In this article, we cover the principles and use cases of Whisper. We will dive into practical examples in Part 2, and share some tricks we have learned from using Whisper in a decentralized exchange project we have been working on.
Have you ever wished if you could just convert a logo you got in a PDF file into an SVG, so you can put up on your website and it would look good on Retina screens too?
Have you ever marvelled the beautifully formatted research papers in PDFs, but you didn’t want to invest into learning TeX or get tangled in installing TeX?
Nix to the rescue!
Have you ever wondered why do you need to install broadly used development tools in different ways on different OSes?
Python, Ruby, Node.js, Clojure, just to name a few.
Wouldn’t it be nice if you could learn one method which works on macOS, Ubuntu, Arch, Amazon Linux, Docker containers?
Enuma Technologies would like to thank the Ethereum Foundation for a grant to implement Sprites state channels. In this blog post we would like to provide an accessible introduction to Sprites and our motivations for pursuing its implementation.
How do you set up a private Ethereum chain and what considerations are there when doing so? A private chain can potentially have huge advantages over public ones, transactions are cheaper, latencies are lower and the level of control you have is higher. Why would you pick Proof-of-Authority over the other consensus methods out there?
These are the slides for my talk at the launch of Ethereum Meetup in Shenzhen, July 29th 2017. This talk was a slightly more hardware focused version of my previous talk about “Hardware Digital Signatures” translated to Chinese.
Hardware Digital Signatures have clear security advantages over their software counterparts, and crypto hardware is getting ubiquitous.
These are the slides of my talk for January’s installment of Codeaholics (Hong Kong) meetup, about the why and how of hardware based digital signatures.
Hardware Signing for Ethereum
All popular blockchains, starting with Bitcoin through Ethereum all the way up to Zcash, use the Elliptic Curve Digital Signature Algorithm (ECDSA) for cryptographically signing transactions.
Software implementations of ECDSA may be susceptible to side-channel attacks that leak information about the private key. Luckily, the latest generation devices are equipped with specialized hardware that supports key generation and signing, but leveraging these new features for existing blockchains is not straightforward because of the different algorithms involved.
The work in this article was done on behalf of Trusted Key Solutions and is used in Trusted Key’s IDENTIFY secure digital identity system.
This post is a condensed version of the talk I gave at IoT Asia 2016 in Singapore, talking about the birth of an IoT device, its subsequent development, all the way up to (SPOILERS but not including) its crowdfunding.
subscribe via RSS