-
Crypto Security
The 12 Biggest Hacking Incidents in the History of Crypto
The most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. I suspect a larger one is just behind the corner) It wasn’t easy digging through the entire history of cybercrime involving cryptocurrencies, but…
Read More » -
Industry
Switzerland and United States Forge Quantum Cooperation
In October 2022, Switzerland and the U.S. signed a Joint Statement on Cooperation in Quantum Information Science and Technology, pledging to deepen collaboration between the countries’ researchers and institutions. The agreement, signed in Washington D.C. by Switzerland’s State Secretary for…
Read More » -
Quantum Computing
Cat Qubits 101
Bosonic “cat qubits” are quantum bits encoded in the states of bosonic oscillators (e.g. modes of a microwave cavity) that resemble Schrödinger’s famous alive/dead cat superposition. Instead of relying on a single two-level quantum element, a cat qubit stores information…
Read More » -
Policy & Sovereignty
ENISA Publishes “Post-Quantum Cryptography – Integration study”
The European Union Agency for Cybersecurity (ENISA) has released a report titled “Post-Quantum Cryptography – Integration Study,” offering a comprehensive look at the challenges and necessities of integrating post-quantum cryptographic systems. This publication follows ENISA’s 2021 study on the current…
Read More » -
AI Security
Backdoor Attacks in Machine Learning Models
Backdoor attacks in the context of Machine Learning (ML) refer to the deliberate manipulation of a model's training data or its algorithmic logic to implant a hidden vulnerability, often referred to as a "trigger." Unlike typical vulnerabilities that are discovered…
Read More » -
Crypto Security
How the Big Binance Bridge Hack Will Change the way People View Web3
$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most memorable part. Decentralization is a hot button topic in web3, and Binance is (at the time…
Read More » -
Crypto Security
How a $1B Flash Loan Led to the $182M Beanstalk Farms Exploit
Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized credit-based stablecoin protocol exploit happened is to first understand flash loans, which are a little…
Read More » -
Crypto Security
The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts
Code reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often results in higher-quality code than software developed entirely from scratch. Additionally, the reuse of high-quality, audited libraries reduces security risks by…
Read More » -
Crypto Security
How the Nomad Bridge Hack can Help Us Explore the Potential Downsides of Decentralization
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing. Decentralization is a hot-button topic in 2022. To some, it seems like the solution to a variety of issues plaguing the…
Read More » -
Crypto Security
Introduction to Zero-Knowledge Proofs
Proving knowledge of a secret is the basis of password-based authentication systems. The assumption is that only you know your password. If this is the case, entering your password into a system proves your identity and grants you access to…
Read More » -
Crypto Security
How Crypto’s Biggest Hacker was Found but Never Identified
The $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned, but the identity of the hacker is still unknown. Dubbed “Mr. White Hat” by the Poly…
Read More » -
Crypto Security
The $160M Wintermute Hack: Inside Job or Profanity Bug?
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance. In order to understand the $160M Wintermute hack, we first need to understand algorithmic market makers and how they…
Read More » -
Policy & Sovereignty
NSA Unveils CNSA 2.0 Post-Quantum Algorithm Suite
The U.S. National Security Agency (NSA) has officially announced the release of the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0), a new set of cryptographic standards designed to protect sensitive systems against future quantum-enabled cyber threats. The NSA’s cybersecurity…
Read More » -
Crypto Security
Introduction to Blockchain Layers 0, 1, and 2 Security
What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system. Bitcoin, the original blockchain, maintained a distributed and decentralized digital ledger on top of a peer-to-peer network. Later blockchains, like Ethereum, added complexity by integrating…
Read More » -
Post-Quantum, PQC, Quantum Security
Mitigating Quantum Threats Beyond PQC
The article explores limitations of PQC and explores alternative and complementary approaches to mitigate quantum risks. It provides technical analysis of each strategy, real-world examples of their deployment, and strategic recommendations for decision-makers. The goal is to illuminate why a…
Read More »