Blockchains are already used to store non-financial data for diverse purposes, e.g. to prove authorship of ideas or to prove the existence of a document. One of the largest files stored successfully into the Bitcoin blockchain is an image of Nelson Mandela.
The crypto market is still inefficient. Cryptoassets have different rates on different exchanges. The big question is how we can profit from that inefficiency. One approach is making transactions between exchanges, but if we buy a cryptoasset on one exchange, by the time we can sell it on another, the price difference may no longer […]
In this article we review the main ideas presented in the last cryptoassets valuation Satis Group’s article published by Bloomberg. Satis Group is an ICO advisory firm which has helped model one of the first bitcoin valuation in 2014. According to their report, the cryptoassets ecosystem forecast is promising. Bitcoin and Monero cryptocurrencies are both expected […]
This article aims to extend the analysis of Bitcoin using Metcalfe’s Law performed by Cryptolab Capital on this article. Here, we are going to summarize some ideas and apply them to other major networks. We are going to update the analysis with Bitcoin to review some points and then, we are going to extend the […]
Some people think that cryptoassets are bubbles without intrinsic value and this is mostly due to the fact that they don’t know how to analyze them. Cryptoassets can’t be analyzed with the same valuation frameworks used in stocks and other non-cryptoassets. However, the crypto-community has been generating some useful valuation models. In this article we are […]
In my last article, I’ve shown you how to make a Solidity ERC20 Token for the RSK Mainnet, how to import and use OpenZeppelin libraries and contracts, and how to use Truffle to deploy and interact with our contract.
Although we succeeded in our quest and accomplished our objectives using Truffle, eventually this suite might present failures when you are sending transactions, deploying or managing accounts. In our case, while following the previous article instructions, I’ve had problems managing newly created accounts in Truffle and sending transactions.
In the last article, we have seen how to build an RSK node in our computer, select the proper network for development, configure Truffle to connect and deploy our future contracts, add accounts to our node and obtain funds to use them to pay the gas.
You should have now your node in the selected network fully synced, and at least one account with funds configured in the truffle and RSK node config files for our deployments.
In this article, we’ll be discussing deployment and interaction of Smart-Contracts over the RSK network. Our contract will be an ERC20 Token, based on the OpenZeppelin libraries, and we will deploy it directly into the Mainnet.
It is important to have an estimate of risk for a portfolio when trading with financial assets. Two basic and commonly used risk measures are value-at-risk and expected shortfall. We will illustrate the two concepts with an example and provide the necessary R code to actually calculate the values of both measures. If we take […]
Transactions in Bitcoin are recorded in its blockchain. This makes it possible to see whether coins sent through the network are still valid unspent coins. At the same time, however, the transparency of the data stored in the blockchain can be used to infer private information of users. There are already many cryptocurrencies and “money […]
Synopsis of our full article: Though the research on quantum computers is still facing big challenges, there is also some progress in this field. The National Institute of Security and Technology (NIST) recently published a report on Post-Quantum Cryptography which informs about new developments. They believe that it is time to think of quantum-safe primitives, […]
The challenge of modern cryptography is to find efficient but secure encryption schemes. The Elliptic Curve Integrated Encryption Scheme (ECIES) is a widely used encryption scheme which is specified in many standards. It is used for example in Ethereum’s Whisper. While Bitcoin Core does not implement ECIES, it can be employed to send secure messages […]
A recent paper titled The Blockchain Anomaly presents the difficulties the authors encountered when trying to make two transactions interdependent such that the second transaction cannot be executed without the first being confirmed. Although the paper may be useful as a guide, the title is misleading since Bitcoin does not guarantee the order of transactions (no […]