Two months before the AEternity Universe One Conference, CoinFabrik was asked to build the payments application that would be used in that conference. The app would be built on top of and focused on AEternity State-Channel technologies. It should include a mobile phone application allowing users to register as merchants or customers and perform payments.
CoinFabrik was asked to audit the contracts for the Nahmii Token project. Firstly, we will provide a summary of our discoveries and secondly, we will show the details of our findings.
Public blockchains allow insertion of arbitrary data. Even specific-purpose blockchains like Bitcoin already contain a lot of non-financial data. Although this data insertion can be beneficial in some use cases (e.g. proof of existence), it can also cause damage. If a blockchain contained videos with instructions on how to torture someone, there would immediately be broad consensus that this data must be deleted. But since blockchains are supposed to be immutable databases, the question is: what can be done if this happens?
The security of your crypto-assets depends on one piece of information that you must protect: your private key. If your private key is stolen, all your assets can be stolen. If your private key is lost, all your assets are lost.
Any information stored in a blockchain is supposed to be preserved forever, nobody will be able to change it or even less erase it. But is this really true? Is there any chance that governments or private groups with enough money to finance costly attacks might delete information from a blockchain?
Æternity is a promising blockchain platform with great potential for many application scopes. One such great feature is the native support for state channels.
In this article we will explore how we built a peer-to-peer browser game to explore this Æternity capability; along examine related features of the platform such as ForgAE and companion tools and the Sophia functional contract development language
A security audit is a process in which a client subjects his or her smart contracts to a review, in which one or more auditors search and document vulnerabilities that may alter the project correct functionality. The main idea of this post is to specify the process of audits, who belongs to them and how the different individuals interact from the moment the client reaches us to the moment we end communication with them.
Facebook’s new permissioned blockchain initiative has been received with well-founded criticism, primarily related to concerns over privacy, but the battle that the Libra Association will spark around the world will probably benefit the struggle permissionless blockchains are facing.
This is a step by step guide that shows how to publish a text in the Roptsten testnet of Ethereum. In order to publish in the Mainnet you will need to select it in the first step of the following tutorial.
Blockchains are already used to store non-financial data for diverse purposes, e.g. to prove authorship of ideas or to prove the existence of a document. One of the largest files stored successfully into the Bitcoin blockchain is an image of Nelson Mandela.
After our articles Smart Contract Auditing: Human vs. Machine and Auditing Solidity code with Slither we decided to test another static analysis tool from ChainSecurity called Securify.
If you’ve been following crypto news over the past few months, you have probably heard the words Polkadot and Substrate. However, you might also be curious about what they are exactly, why they’ve been on the news so much and how relevant they are to your business. This article aims to give you a clearer […]