-
Crypto Security
What the $534M Coincheck Hack Taught Us All About Safe Storage of Digital Assets
The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for the way the stolen assets were being stored. Seasoned crypto enthusiasts and early adopters of the…
Read More » -
Crypto Security
Security Threats to Blockchain Networks – 6 – Wallet Attacks
Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While secured with technically unbreakable code, hackers have found numerous ways to gain illicit access to…
Read More » -
Crypto Security
What the Biggest Blockchain Game’s Hack Reveals about the Future of Crypto Adoption
Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s a lot easier to track stolen cryptocurrency than people think. The popular misconception that cryptocurrencies are…
Read More » -
Post-Quantum
Post-Quantum Cryptography (PQC) Introduction
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms (primarily public-key algorithms) designed to be secure against an attack by a future quantum computer. The motivation for PQC is the threat that large-scale quantum computers pose to current cryptographic systems. Today’s widely…
Read More » -
Crypto Security
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this is more secure in theory, the system is not flawless. All blockchains are susceptible to…
Read More » -
Quantum Networks
Quantum Teleportation
Quantum teleportation is a process by which the state of a quantum system (a qubit) can be transmitted from one location to another without physically sending the particle itself. Quantum teleportation has become a foundational method in quantum communication, envisioned…
Read More » -
AI Security
The Threat of Query Attacks on Machine Learning Models
Query attacks are a type of cybersecurity attack specifically targeting machine learning models. In essence, attackers issue a series of queries, usually input data fed into the model, to gain insights from the model's output. This could range from understanding…
Read More » -
Crypto Security
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes. While blockchain networks are theoretically robust against such attempts, both hackers and academics have found…
Read More » -
Crypto Security
Security Threats to Blockchain Networks – 3 – Smart Contracts
Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always present opportunities for hackers to exploit. So far, the pace of innovation in counter-measures is…
Read More » -
Quantum Computing
Quantum Entanglement: The “Spooky” Glue Uniting Qubits and Beyond
From enabling quantum supercomputers to securing communications and teleporting quantum states, entanglement is the thread weaving through all of quantum technology. What once struck Einstein as a paradox is today routinely observed and harnessed in labs – the “spooky action”…
Read More » -
Crypto Security
Diving into the $320M Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana. Early February of 2022 was a low-point for the cryptocurrency asset class; one of many more to come throughout the…
Read More » -
Crypto Security
Security Threats to Blockchain Networks – 2 – A Holistic Overview
The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a blockchain-based setting, and even cryptographically-secured processes are prone to errors and exploits. Understanding the potential attack…
Read More » -
AI Security
Securing Data Labeling Through Differential Privacy
Differential Privacy is a privacy paradigm that aims to reconcile the conflicting needs of data utility and individual privacy. Rooted in the mathematical theories of privacy and cryptography, Differential Privacy offers quantifiable privacy guarantees and has garnered substantial attention for…
Read More » -
Quantum Computing
Transmon Qubits 101
Transmon qubits are a type of superconducting qubit designed to mitigate charge noise by shunting a Josephson junction with a large capacitor. In other words, a transmon is a superconducting charge qubit that has reduced sensitivity to charge fluctuations. The…
Read More » -
Crypto Security
Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy
Cyber-Attack Strategies in the Blockchain Era – A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors through asymmetric information Pump-and-dump Parties conspire to artificially inflate (pump) the price of an…
Read More »