Oct 9, 2019
Ethereum 2.0 is fast approaching with multiple implementations underway. We examine the attack surface of Eth2, specifically: - Networking (eclipse attacks, transport encryption, discovery protocol, anonymity) - Software vulnerabilities (DoS, code integrity, inconsistent state transitions) - Consensus assumptions (honest majority, liveness) - Efforts underway (fuzzing, code review, external assessments)
Next generation programming platform for decentralized applications.
Professional recording and live streaming, delivered globally.
Presentations on similar topic, category or speaker