The second stage of the Dogethereum bridge was presented on September 5, 2018 at 10 am (PT) and live streamed. The bridge uses “superblocks” to move coins from Dogecoin to Ethereum and collateralization to move coins from Ethereum to Dogecoin. We are excited because this innovation can also be used to bridge other blockchain pairs. […]
At CoinFabrik we are organizing internal presentations in response to interesting work we are doing. As we have grown, scheduling time to share our projects and ideas has become essential. Recent presentations have included: Decentralized Blockchain Bridges Last year Oscar Guindzberg, TrueBit, and CoinFabrik partnered to create a decentralized trustless bridge between Dogecoin and Ethereum […]
This article aims to extend the analysis of Bitcoin using Metcalfe’s Law performed by Cryptolab Capital on this article. Here, we are going to summarize some ideas and apply them to other major networks. We are going to update the analysis with Bitcoin to review some points and then, we are going to extend the […]
Some people think that cryptoassets are bubbles without intrinsic value and this is mostly due to the fact that they don’t know how to analyze them. Cryptoassets can’t be analyzed with the same valuation frameworks used in stocks and other non-cryptoassets. However, the crypto-community has been generating some useful valuation models. In this article we are […]
In my last article, I’ve shown you how to make a Solidity ERC20 Token for the RSK Mainnet, how to import and use OpenZeppelin libraries and contracts, and how to use Truffle to deploy and interact with our contract.
Although we succeeded in our quest and accomplished our objectives using Truffle, eventually this suite might present failures when you are sending transactions, deploying or managing accounts. In our case, while following the previous article instructions, I’ve had problems managing newly created accounts in Truffle and sending transactions.
In the last article, we have seen how to build an RSK node in our computer, select the proper network for development, configure Truffle to connect and deploy our future contracts, add accounts to our node and obtain funds to use them to pay the gas.
You should have now your node in the selected network fully synced, and at least one account with funds configured in the truffle and RSK node config files for our deployments.
In this article, we’ll be discussing deployment and interaction of Smart-Contracts over the RSK network. Our contract will be an ERC20 Token, based on the OpenZeppelin libraries, and we will deploy it directly into the Mainnet.
It is important to have an estimate of risk for a portfolio when trading with financial assets. Two basic and commonly used risk measures are value-at-risk and expected shortfall. We will illustrate the two concepts with an example and provide the necessary R code to actually calculate the values of both measures. If we take […]
Security Smart Contract Auditing: Beware of Duplicated Storage in Solidity Smart Contract Development Solidity semantics are confusing for smart contract developers with experience in traditional programming languages. This semantics can lead to security issues like the one we found in a recent smart contract security audit we did. The following code caught our attention: In […]
We describe a geth source code change which enables faster block mining. We hope this option will be included in Ethereum command lines. Private Ethereum blockchains may be deployed by private entities to use in production or in the software development process. There are different ways of speeding the development environment. Some developers choose an […]
In the blockchain development industry lot of new technologies had arisen in the latest months. Unfortunately, most of the new platforms are not ready to use in production or directly they were built only to develop Demos. Our developers in Coinfabrik have been struggling to use them in the real world. Our customer asked to use Hyperledger but our initial […]
Synopsis of our full article: Though the research on quantum computers is still facing big challenges, there is also some progress in this field. The National Institute of Security and Technology (NIST) recently published a report on Post-Quantum Cryptography which informs about new developments. They believe that it is time to think of quantum-safe primitives, […]
The challenge of modern cryptography is to find efficient but secure encryption schemes. The Elliptic Curve Integrated Encryption Scheme (ECIES) is a widely used encryption scheme which is specified in many standards. It is used for example in Ethereum’s Whisper. While Bitcoin Core does not implement ECIES, it can be employed to send secure messages […]