The Reference Frame: Users of the Bitcoin are sponsors of ...

Agreement with Satoshi – On the Formalization of Nakamoto Consensus

Cryptology ePrint Archive: Report 2018/400
Date: 2018-05-01
Author(s): Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl

Link to Paper


Abstract
The term Nakamoto consensus is generally used to refer to Bitcoin's novel consensus mechanism, by which agreement on its underlying transaction ledger is reached. It is argued that this agreement protocol represents the core innovation behind Bitcoin, because it promises to facilitate the decentralization of trusted third parties. Specifically, Nakamoto consensus seeks to enable mutually distrusting entities with weak pseudonymous identities to reach eventual agreement while the set of participants may change over time. When the Bitcoin white paper was published in late 2008, it lacked a formal analysis of the protocol and the guarantees it claimed to provide. It would take the scientific community several years before first steps towards such a formalization of the Bitcoin protocol and Nakamoto consensus were presented. However, since then the number of works addressing this topic has grown substantially, providing many new and valuable insights. Herein, we present a coherent picture of advancements towards the formalization of Nakamoto consensus, as well as a contextualization in respect to previous research on the agreement problem and fault tolerant distributed computing. Thereby, we outline how Bitcoin's consensus mechanism sets itself apart from previous approaches and where it can provide new impulses and directions to the scientific community. Understanding the core properties and characteristics of Nakamoto consensus is of key importance, not only for assessing the security and reliability of various blockchain systems that are based on the fundamentals of this scheme, but also for designing future systems that aim to fulfill comparable goals.

References
[AAC+05] Amitanand S Aiyer, Lorenzo Alvisi, Allen Clement, Mike Dahlin, Jean-Philippe Martin, and Carl Porth. Bar fault tolerance for cooperative services. In ACM SIGOPS operating systems review, volume 39, pages 45–58. ACM, 2005.
[ABSFG08] Eduardo A Alchieri, Alysson Neves Bessani, Joni Silva Fraga, and Fab´ıola Greve. Byzantine consensus with unknown participants. In Proceedings of the 12th International Conference on Principles of Distributed Systems, pages 22–40. SpringerVerlag, 2008.
[AFJ06] Dana Angluin, Michael J Fischer, and Hong Jiang. Stabilizing consensus in mobile networks. In Distributed Computing in Sensor Systems, pages 37–50. Springer, 2006.
[AJK05] James Aspnes, Collin Jackson, and Arvind Krishnamurthy. Exposing computationally-challenged byzantine impostors. Department of Computer Science, Yale University, New Haven, CT, Tech. Rep, 2005.
[AMN+16] Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus. https://arxiv.org/abs/1612.02916, Dec 2016. Accessed: 2017-02-06.
[AS98] Yair Amir and Jonathan Stanton. The spread wide area group communication system. Technical report, TR CNDS-98-4, The Center for Networking and Distributed Systems, The Johns Hopkins University, 1998.
[Bag00] Walter Bagehot. The english constitution, volume 3. Kegan Paul, Trench, Trubner, 1900. ¨
[Ban98] Bela Ban. Design and implementation of a reliable group communication toolkit for java, 1998.
[BBRTP07] Roberto Baldoni, Marin Bertier, Michel Raynal, and Sara Tucci-Piergiovanni. Looking for a definition of dynamic distributed systems. In International Conference on Parallel Computing Technologies, pages 1–14. Springer, 2007.
[Bit] Bitcoin community. Bitcoin-core source code. https://github.com/bitcoin/bitcoin. Accessed: 2015-06-30.
[BJ87] Ken Birman and Thomas Joseph. Exploiting virtual synchrony in distributed systems. volume 21. ACM, 1987.
[BMC+15] Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In IEEE Symposium on Security and Privacy, 2015.
[BO83] Michael Ben-Or. Another advantage of free choice (extended abstract): Completely asynchronous agreement protocols. In Proceedings of the second annual ACM symposium on Principles of distributed computing, pages 27–30. ACM, 1983.
[BPS16a] Iddo Bentov, Rafael Pass, and Elaine Shi. The sleepy model of consensus. https://eprint.iacr.org/2016/918.pdf, 2016. Accessed: 2016-11-08.
[BPS16b] Iddo Bentov, Rafael Pass, and Elaine Shi. Snow white: Provably secure proofs of stake. https://eprint.iacr.org/2016/919.pdf, 2016. Accessed: 2016-11-08.
[BR09] Franc¸ois Bonnet and Michel Raynal. The price of anonymity: Optimal consensus despite asynchrony, crash and anonymity. In Proceedings of the 23rd international conference on Distributed computing, pages 341–355. Springer-Verlag, 2009.
[Bre00] EA Brewer. Towards robust distributed systems. abstract. In Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, page 7, 2000.
[BSAB+17] Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. Consensus in the age of blockchains. arXiv:1711.03936, 2017. Accessed:2017-12-11.
[BT16] Zohir Bouzid and Corentin Travers. Anonymity-preserving failure detectors. In International Symposium on Distributed Computing, pages 173–186. Springer, 2016.
[Can00] Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of CRYPTOLOGY, 13(1):143–202, 2000.
[Can01] Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on, pages 136–145. IEEE, 2001.
[CFN90] David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Proceedings on Advances in cryptology, pages 319–327. Springer-Verlag New York, Inc., 1990.
[CGR07] Tushar D Chandra, Robert Griesemer, and Joshua Redstone. Paxos made live: an engineering perspective. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, pages 398–407. ACM, 2007.
[CGR11] Christian Cachin, Rachid Guerraoui, and Luis Rodrigues. Introduction to reliable and secure distributed programming. Springer Science & Business Media, 2011.
[CKS00] Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in constantinople: Practical asynchronous byzantine agreement using cryptography. In Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing, pages 123–132. ACM, 2000.
[CL+99] Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173–186, 1999.
[CL02] Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398–461, 2002.
[CNV04] Miguel Correia, Nuno Ferreira Neves, and Paulo Verissimo. How to tolerate half less one byzantine nodes in practical distributed systems. In Reliable Distributed Systems, 2004. Proceedings of the 23rd IEEE International Symposium on, pages 174–183. IEEE, 2004.
[Coo09] J. L. Coolidge. The gambler’s ruin. Annals of Mathematics, 10(4):181–192, 1909.
[Cri91] Flaviu Cristian. Reaching agreement on processor-group membrship in synchronous distributed systems. Distributed Computing, 4(4):175–187, 1991.
[CT96] Tushar Deepak Chandra and Sam Toueg. Unreliable failure detectors for reliable distributed systems. volume 43, pages 225–267. ACM, 1996.
[CV17] Christian Cachin and Marko Vukolic. Blockchain con- ´sensus protocols in the wild. arXiv:1707.01873, 2017. Accessed:2017-09-26.
[CVL10] Miguel Correia, Giuliana S Veronese, and Lau Cheuk Lung. Asynchronous byzantine consensus with 2f+ 1 processes. In Proceedings of the 2010 ACM symposium on applied computing, pages 475–480. ACM, 2010.
[CVNV11] Miguel Correia, Giuliana Santos Veronese, Nuno Ferreira Neves, and Paulo Verissimo. Byzantine consensus in asynchronous message-passing systems: a survey. volume 2, pages 141–161. Inderscience Publishers, 2011.
[CWA+09] Allen Clement, Edmund L Wong, Lorenzo Alvisi, Michael Dahlin, and Mirco Marchetti. Making byzantine fault tolerant systems tolerate byzantine faults. In NSDI, volume 9, pages 153–168, 2009.
[DDS87] Danny Dolev, Cynthia Dwork, and Larry Stockmeyer. On the minimal synchronism needed for distributed consensus. volume 34, pages 77–97. ACM, 1987.
[Dei] Wei Dei. b-money. http://www.weidai.com/bmoney.txt. Accessed on 03/03/2017.
[DGFGK10] Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, and Anne-Marie Kermarrec. Brief announcement: Byzantine agreement with homonyms. In Proceedings of the twentysecond annual ACM symposium on Parallelism in algorithms and architectures, pages 74–75. ACM, 2010.
[DGG02] Assia Doudou, Benoˆıt Garbinato, and Rachid Guerraoui. Encapsulating failure detection: From crash to byzantine failures. In International Conference on Reliable Software Technologies, pages 24–50. Springer, 2002.
[DGKR17] Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexan- ˇder Russell. Ouroboros praos: An adaptively-secure, semisynchronous proof-of-stake protocol. Cryptology ePrint Archive, Report 2017/573, 2017. Accessed: 2017-06-29.
[DLP+86] Danny Dolev, Nancy A Lynch, Shlomit S Pinter, Eugene W Stark, and William E Weihl. Reaching approximate agreement in the presence of faults. volume 33, pages 499–516. ACM, 1986.
[DLS88] Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Consensus in the presence of partial synchrony. volume 35, pages 288–323. ACM, 1988.
[DN92] Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference, pages 139–147. Springer, 1992.
[Dol81] Danny Dolev. Unanimity in an unknown and unreliable environment. In Foundations of Computer Science, 1981. SFCS’81. 22nd Annual Symposium on, pages 159–168. IEEE, 1981.
[Dou02] John R Douceur. The sybil attack. In International Workshop on Peer-to-Peer Systems, pages 251–260. Springer, 2002.
[DSU04] Xavier Defago, Andr ´ e Schiper, and P ´ eter Urb ´ an. Total order ´ broadcast and multicast algorithms: Taxonomy and survey. ACM Computing Surveys (CSUR), 36(4):372–421, 2004.
[DW13] Christian Decker and Roger Wattenhofer. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pages 1–10. IEEE, 2013.
[EGSvR16] Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert van Renesse. Bitcoin-ng: A scalable blockchain protocol. In 13th USENIX Security Symposium on Networked Systems Design and Implementation (NSDI’16). USENIX Association, Mar 2016.
[ES14] Ittay Eyal and Emin Gun Sirer. Majority is not enough: Bitcoin ¨ mining is vulnerable. In Financial Cryptography and Data Security, pages 436–454. Springer, 2014.
[Fin04] Hal Finney. Reusable proofs of work (rpow). http://web.archive.org/web/20071222072154/http://rpow.net/, 2004. Accessed: 2016-04-31.
[Fis83] Michael J Fischer. The consensus problem in unreliable distributed systems (a brief survey). In International Conference on Fundamentals of Computation Theory, pages 127–140. Springer, 1983.
[FL82] Michael J FISCHER and Nancy A LYNCH. A lower bound for the time to assure interactive consistency. volume 14, Jun 1982.
[FLP85] Michael J Fischer, Nancy A Lynch, and Michael S Paterson. Impossibility of distributed consensus with one faulty process. volume 32, pages 374–382. ACM, 1985.
[Fuz08] Rachele Fuzzati. A formal approach to fault tolerant distributed consensus. PhD thesis, EPFL, 2008.
[GHM+17] Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. Algorand: Scaling byzantine agreements for cryptocurrencies. Cryptology ePrint Archive, Report 2017/454, 2017. Accessed: 2017-06-29.
[GKL15] Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology-EUROCRYPT 2015, pages 281–310. Springer, 2015.
[GKL16] Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol with chains of variable difficulty. http://eprint.iacr.org/2016/1048.pdf, 2016. Accessed: 2017-02-06.
[GKP17] Juan A. Garay, Aggelos Kiayias, and Giorgos Panagiotakos. Proofs of work for blockchain protocols. Cryptology ePrint Archive, Report 2017/775, 2017. http://eprint.iacr.org/2017/775.
[GKQV10] Rachid Guerraoui, Nikola Knezevi ˇ c, Vivien Qu ´ ema, and Marko ´ Vukolic. The next 700 bft protocols. In ´ Proceedings of the 5th European conference on Computer systems, pages 363–376. ACM, 2010.
[GKTZ12] Adam Groce, Jonathan Katz, Aishwarya Thiruvengadam, and Vassilis Zikas. Byzantine agreement with a rational adversary. pages 561–572. Springer, 2012.
[GKW+16] Arthur Gervais, Ghassan O Karame, Karl Wust, Vasileios ¨ Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. On the security and performance of proof of work blockchains. https://eprint.iacr.org/2016/555.pdf, 2016. Accessed: 2016-08-10.
[GL02] Seth Gilbert and Nancy Lynch. Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. volume 33, pages 51–59. ACM, 2002.
[GRKC15] Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 692–705. ACM, 2015.
[Her88] Maurice P Herlihy. Impossibility and universality results for wait-free synchronization. In Proceedings of the seventh annual ACM Symposium on Principles of distributed computing, pages 276–290. ACM, 1988.
[Her91] Maurice Herlihy. Wait-free synchronization. ACM Transactions on Programming Languages and Systems (TOPLAS), 13(1):124–149, 1991.
[HKZG15] Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. Eclipse attacks on bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15), pages 129–144, 2015.
[Hoe07] Jaap-Henk Hoepman. Distributed double spending prevention. In Security Protocols Workshop, pages 152–165. Springer, 2007.
[HT94] Vassos Hadzilacos and Sam Toueg. A modular approach to fault-tolerant broadcasts and related problems. Cornell University Technical Report 94-1425, 1994.
[IT08] Hideaki Ishii and Roberto Tempo. Las vegas randomized algorithms in distributed consensus problems. In 2008 American Control Conference, pages 2579–2584. IEEE, 2008.
[JB99] Ari Juels and John G Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS, volume 99, pages 151–165, 1999.
[KMMS01] Kim Potter Kihlstrom, Louise E Moser, and P Michael MelliarSmith. The securering group communication system. ACM Transactions on Information and System Security (TISSEC), 4(4):371–406, 2001.
[KMMS03] Kim Potter Kihlstrom, Louise E Moser, and P Michael MelliarSmith. Byzantine fault detectors for solving consensus. volume 46, pages 16–35. Br Computer Soc, 2003.
[KMTZ13] Jonathan Katz, Ueli Maurer, Bjorn Tackmann, and Vassilis ¨ Zikas. Universally composable synchronous computation. In TCC, volume 7785, pages 477–498. Springer, 2013.
[KP15] Aggelos Kiayias and Giorgos Panagiotakos. Speed-security tradeoff s in blockchain protocols. https://eprint.iacr.org/2015/1019.pdf, Oct 2015. Accessed: 2016-10-17.
[KP16] Aggelos Kiayias and Giorgos Panagiotakos. On trees, chains and fast transactions in the blockchain. http://eprint.iacr.org/2016/545.pdf, 2016. Accessed: 2017-02-06.
[KRDO16] Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. Ouroboros: A provably secure proof-of-stake blockchain protocol. https://pdfs.semanticscholar.org/1c14/549f7ba7d6a000d79a7d12255eb11113e6fa.pdf, 2016. Accessed: 2017-02-20.
[Lam84] Leslie Lamport. Using time instead of timeout for fault-tolerant distributed systems. volume 6, pages 254–280. ACM, 1984.
[Lam98] Leslie Lamport. The part-time parliament. volume 16, pages 133–169. ACM, 1998.
[LCW+06] Harry C Li, Allen Clement, Edmund L Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, and Michael Dahlin. Bar gossip. In Proceedings of the 7th symposium on Operating systems design and implementation, pages 191–204. USENIX Association, 2006.
[LSM06] Brian Neil Levine, Clay Shields, and N Boris Margolin. A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst, MA, 7, 2006.
[LSP82] Leslie Lamport, Robert Shostak, and Marshall Pease. The byzantine generals problem. volume 4, pages 382–401. ACM, 1982.
[LSZ15] Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. Inclusive block chain protocols. In Financial Cryptography and Data Security, pages 528–547. Springer, 2015.
[LTKS15] Loi Luu, Jason Teutsch, Raghav Kulkarni, and Prateek Saxena. Demystifying incentives in the consensus computer. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 706–719. ACM, 2015.
[Lyn96] Nancy A Lynch. Distributed algorithms. Morgan Kaufmann, 1996.
[Mic16] Silvio Micali. Algorand: The efficient and democratic ledger. http://arxiv.org/abs/1607.01341, 2016. Accessed: 2017-02-09.
[Mic17] Silvio Micali. Byzantine agreement, made trivial. https://people.csail.mit.edu/silvio/SelectedApr 2017. Accessed:2018-02-21.
[MJ14] A Miller and LaViola JJ. Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin. https://socrates1024.s3.amazonaws.com/consensus.pdf, 2014. Accessed: 2016-03-09.
[MMRT03] Dahlia Malkhi, Michael Merritt, Michael K Reiter, and Gadi Taubenfeld. Objects shared by byzantine processes. volume 16, pages 37–48. Springer, 2003.
[MPR01] Hugo Miranda, Alexandre Pinto, and Luıs Rodrigues. Appia, a flexible protocol kernel supporting multiple coordinated channels. In Distributed Computing Systems, 2001. 21st International Conference on., pages 707–710. IEEE, 2001.
[MR97] Dahlia Malkhi and Michael Reiter. Unreliable intrusion detection in distributed computations. In Computer Security Foundations Workshop, 1997. Proceedings., 10th, pages 116–124. IEEE, 1997.
[MRT00] Achour Mostefaoui, Michel Raynal, and Fred´ eric Tronel. From ´ binary consensus to multivalued consensus in asynchronous message-passing systems. Information Processing Letters, 73(5-6):207–212, 2000.
[MXC+16] Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of bft protocols. https://eprint.iacr.org/2016/199.pdf, 2016. Accessed: 2017-01-10.
[Nak08a] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf, Dec 2008. Accessed: 2015-07-01.
[Nak08b] Satoshi Nakamoto. Bitcoin p2p e-cash paper, 2008.
[Nar16] Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. Bitcoin and cryptocurrency technologies. https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton bitcoin book.pdf?a=1, 2016. Accessed: 2016-03-29.
[Nei94] Gil Neiger. Distributed consensus revisited. Information processing letters, 49(4):195–201, 1994.
[NG16] Christopher Natoli and Vincent Gramoli. The blockchain anomaly. In Network Computing and Applications (NCA), 2016 IEEE 15th International Symposium on, pages 310–317. IEEE, 2016.
[NKMS16] Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 1st IEEE European Symposium on Security and Privacy, 2016. IEEE, 2016.
[PS16a] Rafael Pass and Elaine Shi. Fruitchains: A fair blockchain. http://eprint.iacr.org/2016/916.pdf, 2016. Accessed: 2016-11-08.
[PS16b] Rafael Pass and Elaine Shi. Hybrid consensus: Scalable permissionless consensus. https://eprint.iacr.org/2016/917.pdf, Sep 2016. Accessed: 2016-10-17.
[PS17] Rafael Pass and Elaine Shi. Thunderella: Blockchains with optimistic instant confirmation. Cryptology ePrint Archive, Report 2017/913, 2017. Accessed:2017-09-26.
[PSL80] Marshall Pease, Robert Shostak, and Leslie Lamport. Reaching agreement in the presence of faults. volume 27, pages 228–234. ACM, 1980.
[PSs16] Rafael Pass, Lior Seeman, and abhi shelat. Analysis of the blockchain protocol in asynchronous networks. http://eprint.iacr.org/2016/454.pdf, 2016. Accessed: 2016-08-01.
[Rab83] Michael O Rabin. Randomized byzantine generals. In Foundations of Computer Science, 1983., 24th Annual Symposium on, pages 403–409. IEEE, 1983.
[Rei96] Michael K Reiter. A secure group membership protocol. volume 22, page 31, 1996.
[Ric93] Aleta M Ricciardi. The group membership problem in asynchronous systems. PhD thesis, Cornell University, 1993.
[Ros14] M. Rosenfeld. Analysis of hashrate-based double spending. http://arxiv.org/abs/1402.2009, 2014. Accessed: 2016-03-09.
[RSW96] Ronald L Rivest, Adi Shamir, and David A Wagner. Time-lock puzzles and timed-release crypto. 1996.
[Sch90] Fred B Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. volume 22, pages 299–319. ACM, 1990.
[SLZ16] Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. Spectre: A fast and scalable cryptocurrency protocol. Cryptology ePrint Archive, Report 2016/1159, 2016. Accessed: 2017-02-20.
[SSZ15] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. http://arxiv.org/pdf/1507.06183.pdf, 2015. Accessed: 2016-08-22.
[SW16] David Stolz and Roger Wattenhofer. Byzantine agreement with median validity. In LIPIcs-Leibniz International Proceedings in Informatics, volume 46. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2016.
[Swa15] Tim Swanson. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf, Apr 2015. Accessed: 2017-10-03.
[SZ13] Yonatan Sompolinsky and Aviv Zohar. Accelerating bitcoin’s transaction processing. fast money grows on trees, not chains, 2013.
[SZ16] Yonatan Sompolinsky and Aviv Zohar. Bitcoin’s security model revisited. http://arxiv.org/pdf/1605.09193, 2016. Accessed: 2016-07-04.
[Sza14] Nick Szabo. The dawn of trustworthy computing. http://unenumerated.blogspot.co.at/2014/12/the-dawn-of-trustworthy-computing.html, 2014. Accessed: 2017-12-01.
[TS16] Florian Tschorsch and Bjorn Scheuermann. Bitcoin and ¨ beyond: A technical survey on decentralized digital currencies. In IEEE Communications Surveys Tutorials, volume PP, pages 1–1, 2016.
[VCB+13] Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, and Paulo Verissimo. Efficient byzantine fault-tolerance. volume 62, pages 16–30. IEEE, 2013.
[Ver03] Paulo Ver´ıssimo. Uncertainty and predictability: Can they be reconciled? In Future Directions in Distributed Computing, pages 108–113. Springer, 2003.
[Vuk15] Marko Vukolic. The quest for scalable blockchain fabric: ´ Proof-of-work vs. bft replication. In International Workshop on Open Problems in Network Security, pages 112–125. Springer, 2015.
[Vuk16] Marko Vukolic. Eventually returning to strong consistency. https://pdfs.semanticscholar.org/a6a1/b70305b27c556aac779fb65429db9c2e1ef2.pdf, 2016. Accessed: 2016-08-10.
[XWS+17] Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. A taxonomy of blockchain-based systems for architecture design. In Software Architecture (ICSA), 2017 IEEE International Conference on , pages 243–252. IEEE, 2017.
[YHKC+16] Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. Where is current research on blockchain technology? – a systematic review. volume 11, page e0163477. Public Library of Science, 2016.
[ZP17] Ren Zhang and Bart Preneel. On the necessity of a prescribed block validity consensus: Analyzing bitcoin unlimited mining protocol. http://eprint.iacr.org/2017/686, 2017. Accessed: 2017-07-20.
submitted by dj-gutz to myrXiv [link] [comments]

8am Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  5. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  6. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  7. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  8. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  9. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  10. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  11. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  12. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  13. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  14. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  15. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  16. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  17. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  18. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  19. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  20. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  21. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  22. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  23. There Are More Internet Addresses Than Stars in the Universe - 340 Trillion Trillion informationweek.com comments technology
  24. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  25. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  26. London subway system launches free Wi-Fi service as city gears up for Olympics digitaltrends.com comments technology
  27. Kinect sensor can help you find your keys. bbc.com comments technology
  28. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  29. Prototype color e-paper skips on filter, cranks up vividness engadget.com comments technology
  30. Zoe Lofgren asks Attorney General Holder about Feds Unjustified Dajaz1 Seizure youtube.com comments technology
  31. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
  32. Penguins hosting.gmodules.com comments technology
  33. [5 Scientific Ways the Internet is Dividing Us. (Reddit gets a mention)
](http://www.cracked.com/article_19860_5-scientific-ways-internet-dividing-us_p2.html) cracked.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

10am Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  5. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  6. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  7. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  8. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  9. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  10. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  11. Kinect sensor can help you find your keys. bbc.com comments technology
  12. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  13. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  14. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  15. Batteryless switch controls lights in home automation applications - Amazing openpicus.blogspot.it comments technology
  16. Kinsight for Kinect tracks household items, finds the remote for you theverge.com comments technology
  17. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  18. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  19. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  20. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  21. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  22. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  23. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  24. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  25. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  26. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  27. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  28. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  29. Prototype color e-paper skips on filter, cranks up vividness engadget.com comments technology
  30. Zoe Lofgren asks Attorney General Holder about Feds Unjustified Dajaz1 Seizure youtube.com comments technology
  31. A Cybersecurity Treaty Is a Bad Idea usnews.com comments technology
  32. 4D Simulations - Civil Engineering Projects civilonfire.blogspot.in comments technology
  33. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

2pm Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. LinkedIn, Last.fm, eHarmony password leaks bigger than first thought, sites used weak unsalted hashes h-online.com comments technology
  5. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  6. Could someone tell me what happened to the NoteSlate? I was looking to purchase one... i.imgur.com comments technology
  7. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  8. Apple patents laptop wedge shape. wired.com comments technology
  9. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  10. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  11. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  12. China will launch a spacecraft this month to conduct its first manned space docking, the latest step in a plan aimed at giving the country a permanent space station by 2020. phys.org comments technology
  13. Kinect sensor can help you find your keys. bbc.com comments technology
  14. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  15. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  16. Kinsight for Kinect tracks household items, finds the remote for you theverge.com comments technology
  17. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  18. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  19. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  20. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  21. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  22. China has backdoors to US telecom and military components businessinsider.com comments technology
  23. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  24. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  25. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  26. IPMI: Hacking servers that are turned "off" isc.sans.edu comments technology
  27. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  28. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  29. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  30. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  31. Penguins hosting.gmodules.com comments technology
  32. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  33. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  34. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

12pm Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  5. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  6. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  7. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  8. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  9. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  10. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  11. Kinect sensor can help you find your keys. bbc.com comments technology
  12. Kinsight for Kinect tracks household items, finds the remote for you theverge.com comments technology
  13. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  14. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  15. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  16. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  17. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  18. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  19. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  20. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  21. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  22. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  23. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  24. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  25. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  26. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  27. eHarmony says no other info stolen following password hack news.cnet.com comments technology
  28. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  29. Penguins hosting.gmodules.com comments technology
  30. Facebook has a new app that they are launching called App Center. It is currently being tested by a beta group of users and is expected to be made available on a more wider scale shortly... banagadgets.blogspot.com comments technology
  31. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
  32. Prototype color e-paper skips on filter, cranks up vividness engadget.com comments technology
  33. Zoe Lofgren asks Attorney General Holder about Feds Unjustified Dajaz1 Seizure youtube.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

11am Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  5. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  6. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  7. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  8. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  9. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  10. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  11. Kinect sensor can help you find your keys. bbc.com comments technology
  12. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  13. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  14. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  15. Kinsight for Kinect tracks household items, finds the remote for you theverge.com comments technology
  16. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  17. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  18. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  19. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  20. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  21. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  22. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  23. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  24. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  25. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  26. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  27. A Day in the Life - Civil Engineer civilonfire.blogspot.in comments technology
  28. eHarmony says no other info stolen following password hack news.cnet.com comments technology
  29. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  30. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
  31. Prototype color e-paper skips on filter, cranks up vividness engadget.com comments technology
  32. Zoe Lofgren asks Attorney General Holder about Feds Unjustified Dajaz1 Seizure youtube.com comments technology
  33. A Cybersecurity Treaty Is a Bad Idea usnews.com comments technology
  34. A lost city, found with lasers technologyreview.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

9am Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  5. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  6. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  7. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  8. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  9. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  10. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  11. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  12. Kinect sensor can help you find your keys. bbc.com comments technology
  13. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  14. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  15. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  16. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  17. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  18. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  19. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  20. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  21. Kinsight for Kinect tracks household items, finds the remote for you theverge.com comments technology
  22. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  23. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  24. U.N. could tax U.S.-based Web sites, leaked docs show news.cnet.com comments technology
  25. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  26. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  27. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  28. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  29. Prototype color e-paper skips on filter, cranks up vividness engadget.com comments technology
  30. Zoe Lofgren asks Attorney General Holder about Feds Unjustified Dajaz1 Seizure youtube.com comments technology
  31. A Cybersecurity Treaty Is a Bad Idea usnews.com comments technology
  32. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
  33. Penguins hosting.gmodules.com comments technology
  34. [5 Scientific Ways the Internet is Dividing Us. (Reddit gets a mention)
](http://www.cracked.com/article_19860_5-scientific-ways-internet-dividing-us_p2.html) cracked.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

7am Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  5. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  6. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  7. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  8. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  9. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  10. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  11. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  12. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  13. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  14. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  15. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  16. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  17. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  18. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  19. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  20. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  21. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  22. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  23. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  24. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  25. Kinect sensor can help you find your keys. bbc.com comments technology
  26. Facebook has a new app that they are launching called App Center. It is currently being tested by a beta group of users and is expected to be made available on a more wider scale shortly... banagadgets.blogspot.com comments technology
  27. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  28. Prototype color e-paper skips on filter, cranks up vividness engadget.com comments technology
  29. Zoe Lofgren asks Attorney General Holder about Feds Unjustified Dajaz1 Seizure youtube.com comments technology
  30. [5 Scientific Ways the Internet is Dividing Us. (Reddit gets a mention)
](http://www.cracked.com/article_19860_5-scientific-ways-internet-dividing-us_p2.html) cracked.com comments technology
  1. Penguins hosting.gmodules.com comments technology
  2. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
  3. London subway system launches free Wi-Fi service as city gears up for Olympics digitaltrends.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

1pm Sat 9 Jun 2012 - /r/technology

  1. A student who ran a site which enabled the download of a million movie and TV show subtitle files has been found guilty of copyright infringement offenses. Despite it being acknowledged that the 25-year-old made no money from the three-year-old operation, prosecutors demanded a jail sentence. torrentfreak.com comments technology
  2. Game of Thrones crowned most pirated TV show of the season with nearly 4 million downloads per episode; worldwide hype combined with restricted availability are the key ingredients for the staggering number of downloads, but many would pay for it if HBO offered a standalone HBO GO subscription torrentfreak.com comments technology
  3. The Pirate Bay evades ISP blockade with IPv6, can do it 18 septillion more times. extremetech.com comments technology
  4. 3.3″ HDMI-dongle Android Pocket TV funded within 1 week on Kickstarter arstechnica.com comments technology
  5. Famous judge spikes Apple-Google case, calls patent system “dysfunctional” gigaom.com comments technology
  6. A whopping 0.00038% of Facebook users vote on data use policy change: Only 342,632 ballots were cast as of a minute before closing, and the vote needed 270 million participants to be binding arstechnica.com comments technology
  7. Japanese utility company investigating Thorium Molten Salt Reactors (or LFTRs) smartplanet.com comments technology
  8. FBI says it's okay that they illegally took Megaupload files, because nothing "physical" was taken, only digital content. torrentfreak.com comments technology
  9. World's Largest Organization for Computer Professionals Comes Out Against CISPA eff.org comments technology
  10. LinkedIn, Last.fm, eHarmony password leaks bigger than first thought, sites used weak unsalted hashes h-online.com comments technology
  11. The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers. bbc.com comments technology
  12. Kinect sensor can help you find your keys. bbc.com comments technology
  13. You probably all know this but, as a matter of interest, IPv6 could provide 252 individual addresses to each star in the observable universe. itknowledgeexchange.techtarget.com comments technology
  14. Kinsight for Kinect tracks household items, finds the remote for you theverge.com comments technology
  15. Libre.fm resets every user's password as a precaution in light of LinkedIn and Last.fm leaks. computerhelperzz.blogspot.com comments technology
  16. Arthur P. Stern, instrumental in inventing the color television and GPS, passes away engadget.com comments technology
  17. Judge Posner To Apple & Motorola: 'I have tentatively decided that the case should be dismissed with prejudice because neither party can establish a right to relief.' scribd.com comments technology
  18. How Google and Microsoft taught search to "understand" the Web arstechnica.com comments technology
  19. In 50 years, Steve Jobs will be forgotten, Gladwell says news.cnet.com comments technology
  20. This is gold , Computer Virus TV News Report 1988 youtu.be comments technology
  21. Collusion browser addon makes a nice map of who is tracking you. Set it up for one of your kid's sessions on the Internet and be truly horrified. mozilla.org comments technology
  22. IPMI: Hacking servers that are turned "off" isc.sans.edu comments technology
  23. No-cost Windows 8 desktop development returns with Express for Desktop arstechnica.com comments technology
  24. Sony: PS4 games in development, we want to “build a great machine” « GamingBolt.com: Video Game News, Reviews, Previews and Blog gamingbolt.com comments technology
  25. Porn, gambling, and malware: Bitcoin as the Net's Wild West. arstechnica.com comments technology
  26. A woman targeted by 'trolls' on Facebook wins court battle to have their identities disclosed google.com comments technology
  27. A white paper urges Canadian policymakers to introduce domain seizures, criminal prosecutions and asset seizures of online sharing sites, and even SOPA-style regulation of intermediaries. arstechnica.com comments technology
  28. Canadian class-action lawsuit claims Facebook misled investors with IPO winnipegfreepress.com comments technology
  29. Penguins hosting.gmodules.com comments technology
  30. GoToMeeting uses competitor’s name in search ads to trick people into clicking through thenextweb.com comments technology
  31. Europe wants to tax US-based Web sites, leaked docs show news.cnet.com comments technology
  32. MIT creates self-assembling 3D nanostructures, could be the future of computer chips. extremetech.com comments technology
  33. eHarmony says no other info stolen following password hack news.cnet.com comments technology
submitted by frontbot to fronttechnology [link] [comments]

#26 Arthur Breitman, Co-Founder of Tezos: Why Blockchain Is About Winner Takes All Talking with Arthur Hayes - CEO of Bitcoin Exchange BitMex Arthur Traviss Corry: Give Bitcoin a Try! Arthur Hayes on Bitcoin, Bitmex and Nouriel Debate! What is Bitcoin?

If Nakamoto ever sells his Bitcoin fortune, he would likely have to do so at a legitimate Bitcoin bank or exchange, which would not only give away his identity but alert everyone from the IRS to the FBI of his movements. While Bitcoin lets its users conduct transactions anonymously, all transactions can be viewed transparently online - and everyone is watching Nakamoto's Bitcoin to see if he ... Arthur Breunig Wednesday, March 21, 2018. How To Estimate Bitcoin's Fundamental Value. Bitcoin pricing has rebounded of late to again approach the $10,000 mark, which is our estimate for its current fair value based on our bitcoin price estimator dashboard. This estimate is based primarily on factors such as the number of unique users and transaction volumes. While the day-to-day price of ... The Bitcoin miners – or the miners working on any currency with a public blockchain – are collectively an enterprise whose revenues are criminal to a significant percentage, and that's another good reason why these Bitcoin-like cryptocurrencies should be banned. You know, the Italian mafia is also doing some "legitimate business". It's plausible that the percentage of its "legally kosher ... Bitcoin Facebook Platform free in India Start join or Create Account Bitcoin In India. Sunday, 30 August 2020 . Google Alert - Bitcoin Platform Bitcoin Platform. As-it-happens update ⋅ August 30, 2020. NEWS : How To Get Ready For Bitcoin Boom 2020? «Market Leader» - news and previews making you rich. According to Arthur Heinz, CEO of BitMEX, the very fact that Bitcoin has ... with the help ... Beyond Bitcoin - 27th And Final - An Architecture For The Internet Of Money by Arthur Falls published on 2015-02-19T04:02:12Z todays episode is my favourite of all, not to diminish all of the wonderful interviews and guests I've been lucky enough to have on the show.

[index] [26500] [18623] [6442] [13179] [28745] [49414] [19596] [10331] [31066] [49527]

#26 Arthur Breitman, Co-Founder of Tezos: Why Blockchain Is About Winner Takes All

Arthur Hayes is an ex Banker. He founded and runs BITMEX today , the biggest volume exchange in the world. At only 33 years old he is cited to be a billionaire. In this interview he covers ... I have often felt that being located in Toronto, Canada puts me at a bit of a disadvantage with respect to having a futuristic high-tech blog and podcast. Living in Silicon Valley or New York [or ... For longer than two years, Arthur van Pelt has been documenting the false statements and forgeries of self-proclaimed Bitcoin creator Craig Wright. In this interview, the Dutchman explains why he ... While visiting Hong Kong, I had the opportunity to sit down with the CEO of BitMex, Arthur Hayes. We discuss why he left traditional finance for Bitcoin, and he gives us some tips for newcomers to ... This video is unavailable. Watch Queue Queue. Watch Queue Queue

#