Censorship of Harmful Data in Blockchains

Reading Time: 17 minutes

Public blockchains allow insertion of arbitrary data. Even specific-purpose blockchains like Bitcoin already contain a lot of non-financial data. Although this data insertion can be beneficial in some use cases (e.g. proof of existence), it can also cause damage. If a blockchain contained videos with instructions on how to torture someone, there would immediately be broad consensus that this data must be deleted. But since blockchains are supposed to be immutable databases, the question is: what can be done if this happens?

Smart Contract Audit Process

Reading Time: 6 minutes

A security audit is a process in which a client subjects his or her smart contracts to a review, in which one or more auditors search and document vulnerabilities that may alter the project correct functionality. The main idea of this post is to specify the process of audits, who belongs to them and how the different individuals interact from the moment the client reaches us to the moment we end communication with them.

Using the CardContact SmartCard USB HSM in an Ethereum PoA Chain

Reading Time: 4 minutes

After testing the performance of Ethereum using PoA, we tested the usability of the CardContact SmartCard-HSM USB token on an ethereum Proof of Authority network. The HSM allows to store and use multiple encryption keys, both RSA and Elliptic Curves (including secp256k1), for applications like issuing certificates as a CA, and with any application that […]

Some Insights into Cardano ´s Blockchain

Reading Time: 5 minutes

In this blog post, we present a high-level overview of the paper describing the Ouroboros Proof of Stake protocol implemented in Cardano´s blockchain. After the overview follow some comments about theoretical aspects of the protocol.
In general, Proof of Stake (PoS) consensus protocols elect the network nodes responsible to send the next block to the blockchain on the basis of the nodes’ amount of stake.

Dogethereum: A Decentralized Blockchain Bridge Between Dogecoin and Ethereum is Born

Reading Time: 2 minutes

The second stage of the Dogethereum bridge was presented on September 5, 2018 at 10 am (PT) and live streamed. The bridge uses “superblocks” to move coins from Dogecoin to Ethereum and collateralization to move coins from Ethereum to Dogecoin. We are excited because this innovation can also be used to bridge other blockchain pairs. […]

Decentralized Blockchain Bridges, Blockchain Innovations, and Cryptoasset Investment Frameworks

Reading Time: 1

At CoinFabrik we are organizing internal presentations in response to interesting work we are doing. As we have grown, scheduling time to share our projects and ideas has become essential. Recent presentations have included: Decentralized Blockchain Bridges Last year Oscar Guindzberg, TrueBit, and CoinFabrik partnered to create a decentralized trustless bridge between Dogecoin and Ethereum […]

Smart Contract Short Address Attack Mitigation Failure

Reading Time: 3 minutes

Overview Our  smart contract audit team found that Short Address Attack mitigations can cause several problems with smart contracts. A Short Address Attack is when a contract receives less data than it was expecting, and Solidity fills the missing bytes with zeros. The deployed smart contract cannot prevent this and will interpret those extra zeros as […]