9. Říjen 2019
Ethereum 2.0 is fast approaching with multiple implementations underway. We examine the attack surface of Eth2, specifically: - Networking (eclipse attacks, transport encryption, discovery protocol, anonymity) - Software vulnerabilities (DoS, code integrity, inconsistent state transitions) - Consensus assumptions (honest majority, liveness) - Efforts underway (fuzzing, code review, external assessments)
Next generation programming platform for decentralized applications.
Pro uložení prezentace do věčného trezoru hlasovalo 0 diváků, což je 0.0 %
Prezentace na podobné téma, kategorii nebo přednášejícího