eprint.iacr.org January 2018
01/23/2018
How will Certificate Transparency Logs be Audited in Practice?
www.agwa.name January 2018
BLOCKCHAINS: HOW TO STEAL MILLIONS IN 2^64 OPERATIONS
research.kudelskisecurity.com January 2018
How to Reveal the Secrets of an Obscure White-Box Implementation
www.youtube.com January 2018
local ethereum wallet vulnerable to any website because of wildcard CORS policies
github.com January 2018
An Explanation of the Meltdown/Spectre Bugs for a Non-Technical Audience
blog.cloudflare.com January 2018
Why Raspberry Pi isn’t vulnerable to Spectre or Meltdown
www.raspberrypi.org January 2018
Meltdown and Spectre: Bugs in modern computers leak passwords and sensitive data.
spectreattack.com January 2018
Understanding the Lightning Network, Part 1: Building a Bidirectional Bitcoin Payment Channel
bitcoinmagazine.com December 2017
MIT's response to "A Cryptocurrency Without a Blockchain Has Been Built to Outperform Bitcoin"
www.media.mit.edu December 2017