R

Joined Apr 23, 2019

Mute
1ZHEekqswmTDLCJWM9ugvp7aR9KapXcrP
Actions 270
Following 3
Followers 2
Topics following 0
Muted 0
Is Muted By 0

R
1613d
R
1615d
Why do you prefer BSV and fire BTC and its LN

In September, a study https://arxiv.org/pdf/1909.06890.pdf about Bitcoin's Lightning Network began to emerge on the networks. Its authors - Saar Tochner, Aviv Zohar and Stefan Schmid - are convinced that Bitcoin's Lightning Network is a very fragile tool. Why? Why? Because it would be enough to connect intelligently to it to succeed in parasitizing it to the point where the majority of payments on the network could simply no longer succeed.


Theoretical foundations
So let's quickly review together the main differences between the Bitcoin network and the Lightning Network, a network built in a second layer above it.

Bitcoin and its bases
In the Bitcoin blockchain, the possession of bitcoins takes the form of so-called public and private key sets. A private key is produced by randomly selecting any number from 1 to 2256. This number is then subjected to a particular mathematical operation, called an elliptical curve multipl...
Read more...
R
1697d
To understand why blockchain is important, look beyond wild speculation on what is built below.

The Internet bubble of the 1990s is generally considered a period of mad excess that ended with the destruction of hundreds of billions of dollars of wealth. What is less often discussed is how all the cheap capital of the boom years financed the infrastructure on which the most important Internet innovations would be built after the bubble burst. It financed the deployment of fibre optic cable, R&D on 3G networks and the construction of giant server arrays. All this would make possible the technologies that are now the foundation of the world's most powerful societies: algorithmic research, social media, mobile computing, cloud services, large data analysis, artificial intelligence, etc.

We believe that something similar is happening behind the wild volatility and media hype of the stratosphere of the crypto-currency and blockchain boom. The blockchain sceptics growled with joy...
Read more...
R
1743d
Telescope Captures 1800 Exploding Stars

https://web.ipmu.jp/press/201905-HSC-SSP/L/HSCref.jpg
R
1743d
Map of space exploration devices currently on mission

R
1743d
"Creativity is the greatest rebellion there is. If you want to create, you have to get rid of all conditioning; otherwise your creativity will only be reproduction, copying. You can only be creative if you are an individual; as an element of mass psychology, you cannot create. Mass psychology is not creative; it lives life like a ball and chain, it knows neither dance, song nor joy; it is mechanical. »
R
1743d
"EXPERIENCE is what you get when you don't get what you want"
R
replied 1744d
R
Solutions : The HTTP X-XSS-Protection response header is a feature of Internet Explorer, Chrome and Safari that stops pages from loading when they detect reflected cross-site scripting (XSS) attacks. Although these protections are largely unnecessary in modern browsers when sites implement a strong Content-Security-Policy that disables the use of inline JavaScript ('unsafe-inline'), they can still provide protections for users of older web browsers that don't yet support CSP.

Header type Response header
Forbidden header name no
SyntaxSection
X-XSS-Protection: 0
X-XSS-Protection: 1
X-XSS-Protection: 1; mode=block
X-XSS-Protection: 1; report=<reporting-uri>
0
Disables XSS filtering.
1
Enables XSS filtering (usually default in browsers). If a cross-site scripting attack is detected, the browser will sanitize the page (remove the unsafe parts).
1; mode=block
Enables XSS filtering. Rather than sanitizing the page, the browser will prevent rendering of the page if an at...
Read more...
R
1744d
To protect against phishing attacks, online platform providers implement a two-factor authentication process on their websites. But now, hackers can bypass this protection more easily. Two tools have been developed to automate the process and launch hundreds of attacks at a time.

Traditional phishing attacks consist in creating fake hosted login pages on web servers against them by the attacker and whose domain names are similar to those of the target websites.

Traditional phishing attacks consist of creating fake login pages hosted on web servers controlled by the attacker and whose domain names are similar to those of targeted websites. (Credit: Christiaan Colen / Flickr)
Intrusion testers and hackers have been able to add to their arsenal a method that automates phishing attacks, thwarts two-factor authentication (2FA) and is, in addition, not easy to detect and block. This toolkit was presented last month at the Hack in the Box conference in Amsterdam and was released on GitH...
Read more...
R
1745d
Markashi Zuckermoto

R
1750d
The dApps that are not used to.... nothing



#ETH #ETHEREUM #dApps
R
1756d
R
1758d
R
1758d
What what what ?! BCH has 3 blocks in the same minute !??

R
1760d
R
1761d
New fresco by Pascal Boyart
"The Desperate 2019"



#art #bitcoin #society #cityzenery #people
R
1762d
The American Dream (French subtitles) The Power of Banks



#anime #movie #bitcoin #bank
R
1766d
R
1766d
R
1767d
R
1767d
R
1767d
R
1767d
R
1785d
R
1786d
Convincing evidence suggests that the 7,000 BTC Binance piracy mentioned earlier this morning may have been self-inflicted.

While this could have initially been a joke, a number of strange details appear and convincing signs indicate that it was not actually a theft, but a $40 million loophole.

The following results come from CryptoMedication on Twitter. Source Finder.com.au

A failed migration
By studying the TX ID planned for the alleged hacking on Binance, the conclusion is that the funds sent to bech32 addresses are no longer usable.

Shortened ID transaction: https://www.blockchain.com/btc/tx/e8b406091959700dbffcff30a60b190133721e5c39e89bb5fe23c5a554ab05ea

The vast majority of the funds allegedly stolen were transferred to Bech32 addresses.

SegWit Bitcoin portfolios are characterized by Bech32 addresses. SegWit is basically just an improved version of the Bitcoin infrastructure that is better and more user-friendly, while Bech32 addresses are the type of Bitcoin portfolio a...
Read more...