Forwarded from Autobot
D-Squared@
Below is the first ZK introductory blog post along with a video explanation.
Blog post - https://www.dylandavis.net/blog/2022/12/21/zero-knowledge-proofs-introduction/
Explainer video - https://youtu.be/_6Bm5kmov3A
Additionally, there’s a weekly email newsletter I send out relating to crypto security and education if you’re interested.
Subscribe to Newsletter - http://eepurl.com/gLhH9r
P.S. Also, if there are other communities you think would be interested in explainer series like this, feel free to share.
discord: Hey folks - Like many of you I’m embarking on a ZK learning journey. I enjoy learning in public, so feel free to join me on this journey. 😸 Below is the first ZK introductory blog post along with a video explanation.
Blog post - https://www.dylandavis.net/blog/2022/12/21/zero-knowledge-proofs-introduction/
Explainer video - https://youtu.be/_6Bm5kmov3A
Additionally, there’s a weekly email newsletter I send out relating to crypto security and education if you’re interested.
Subscribe to Newsletter - http://eepurl.com/gLhH9r
P.S. Also, if there are other communities you think would be interested in explainer series like this, feel free to share.
https://community.graylog.org/t/securing-inputs/23256/5
https://go2docs.graylog.org/5-0/setting_up_graylog/secured_graylog_and_beats_input.html?tocpath=Setting%20up%20Graylog%7CSecuring%20Graylog%7C_____3
https://go2docs.graylog.org/5-0/setting_up_graylog/secured_graylog_and_beats_input.html?tocpath=Setting%20up%20Graylog%7CSecuring%20Graylog%7C_____3
Graylog Community
Securing inputs
Hello I am using Graylog v4.2, which is running via docker on an Azure VM. I have setup an Nginx reverse proxy for HTTPS. However how do I go about securing the inputs because anyone could log to this instance of Graylog all they need is the URL/IP address…
How to Construct Rational Protocols with Nash
Equilibrium Consistency in the UC framework
https://eprint.iacr.org/2019/1398.pdf
Equilibrium Consistency in the UC framework
https://eprint.iacr.org/2019/1398.pdf
https://beincrypto.com/bridge-liquidity-paradox-water-under-the-bridge/
https://cryptoslate.com/reimagining-cross-chain-bridges-lets-stop-trying-to-be-liquidity-protocols/
https://cryptoslate.com/reimagining-cross-chain-bridges-lets-stop-trying-to-be-liquidity-protocols/
BeInCrypto
Bridge Liquidity Paradox: It’s Not Always Water Under the Bridge
Bridge Liquidity Paradox: More often than not, TVL is just a vanity metric – bridges should revisit their approach to liquidity aggregation.
Forwarded from EthSecurity
My frens wrote a book about security in defi recently
https://www.amazon.ca/Understanding-Cybersecurity-Management-Decentralized-Finance/dp/3031233395/ref=sr_1_1?keywords=Understanding+Cybersecurity+Management+in+Decentralized+Finance&qid=1672026139&sr=8-1
https://www.amazon.ca/Understanding-Cybersecurity-Management-Decentralized-Finance/dp/3031233395/ref=sr_1_1?keywords=Understanding+Cybersecurity+Management+in+Decentralized+Finance&qid=1672026139&sr=8-1