Preface: Last week, rumors about "Bitcoin issuance" and "Ethereum switching to the ProgPoW algorithm" were brought out again to mislead everyone, so in this issue, we will first clarify these things and tell everyone what happened and the real development progress of these projects in the past week. (Photo from: tuchong.com) Let’s start with Bitcoin. 1.1 Rumors about “issuing additional Bitcoins”Recently, former Bitcoin core developer Peter Todd once again proposed the idea of issuing more Bitcoins. He said: “The 21 million supply cap is really just a religious belief.” Then, after this sentence spread to China, it was adapted into "Why does Core persist in trying to issue more BTC?" The key point here is that Peter Todd has actually lost his identity as a Bitcoin developer a long time ago. The last time he contributed code to the core project was in February 2017. This is like an employee of a company who resigned three years ago. His current remarks can only represent himself and cannot be considered an internal proposal of the company. So what is the attitude of the real Core members towards the issuance of additional Bitcoins? After the last rumor of "additional issuance", Wladimir van der Laan, the current chief maintainer of the core project team, had to refute the rumor: “This is bullshit, and sadly it needs to be made clear, no one in their right mind would propose a change to Bitcoin’s monetary policy. If a piece of software claiming to be ‘bitcoin core’ proposed this, I would recommend running the software without this change, because it is broken.” Another core maintainer, Peter Wuille, holds the same attitude, so remember not to believe similar rumors. 1.2 What are real Bitcoin developers discussing?So what were actual Bitcoin developers working on last week?
Notable code and documentation changes Last week, Bitcoin Core, C-Lightning, Eclair, LND, libsecp256k1, Bitcoin Improvement Proposals (BIPs), and Lightning Network BOLTs all saw notable changes, including:
For more development updates, readers can refer to: https://bitcoinops.org/en/newsletters/2020/02/19/. After talking about Bitcoin, let’s look at another rumor. 1.3 Rumors about Ethereum ProgPoWLast week, a foreign media outlet also broke the “big” news that Ethereum developers unanimously agreed to implement ProgPoW, which caused panic among Ethereum mining machine manufacturers and also attracted much attention from miners. The source of this rumor is the 81st video conference of the Ethereum Core development team, which mainly discussed the following:
Among them, EIP-1057 (ProgPoW) is the focus of everyone. The so-called ProgPoW is an alternative implementation of Ethereum's existing PoW algorithm Ethash. Its purpose is to resist Asic mining machines. The audit of this algorithm scheme was announced in September last year. However, its existence is very controversial. Its proposers and supporters believe that ProgPoW can effectively resist ASIC mining of the Ethereum network, thereby promoting the decentralization of the network. However, this is not the only voice in the Ethereum community. There are actually many opposing voices. Therefore, in the last Istanbul fork upgrade, EIP-1057 (ProgPoW) was not included, and then its supporters expected to include it in the next hard fork upgrade Berlin (Berlin, which will take place around June-July this year). But in reality, it still encounters a lot of resistance. For example, developer Marius Kjærstad wondered: “Why are people still pushing for ProgPoW? It has already been rejected by the community.” If this isn’t enough, here’s what Ethereum co-founder Vitalik Buterin said: “Hey, this thing was gone before and now, oh my god, it’s scheduled for the next hard fork???” Vitalik said he would remain neutral on the proposal and only criticize the decision-making process. Well, this is the situation. As to whether ProgPoW will be included in the next Ethereum hard fork, there are currently huge differences among developers. It is not "consensus has been reached" as some developers say. I personally tend to think that it will not be accepted in the short term. Satoxi's brief comment: The two rumors about Bitcoin and Ethereum last week actually belong to different situations. The former is groundless, and the latter has not yet been determined. As for this kind of development progress news, the author recommends that everyone pay attention to the two websites bitcoinops and weekinethereumnews, rather than one-sided reports from individual media. 2. Academic Achievements Exhibition at Stanford Blockchain ConferenceAfter refuting the rumors, let’s take a brief look at some of the blockchain academic research content from last week. The 4th Stanford Blockchain Conference was held as scheduled from February 20th to 22nd, Beijing time. The conference focused on security engineering and risk management methods in blockchain systems, and explored ways to improve the security of blockchain systems through the application of encryption technology, decentralized protocols, formal methods, and empirical analysis. In this conference, scholars from well-known institutions such as Stanford University, MIT, Princeton University, Cornell University, New York University, UC Berkeley, Facebook, and the Ethereum Foundation shared some academic achievements, such as:
For more information, please see here: https://cbr.stanford.edu/sbc20/ Related reports:
Satouxi's brief comment: Overall, this academic conference focused on research on scalability, privacy, consensus mechanisms, blockchain economy, and off-chain solutions. These are some of the hottest topics in blockchain research. Interested readers can read the original papers themselves. 3. Security discussion triggered by bZx protocol attack, Fcoin incident and whale theftAfter focusing on academic content, let’s take a look at some blockchain security incidents that have occurred in reality. Last week, the bZx protocol attack, the Fcoin incident, and the whale theft incident became the focus of attention in the cryptocurrency community, which also triggered a wave of discussions on smart contract security and private key custody. For example, these two articles from PeckShield provide detailed analysis of the specific process and vulnerabilities of these two attacks:
The threat posed by flash loans is not limited to the bZx protocol. For example, Dominik Harz, a scholar from Imperial College London, analyzed how to use flash loans and Maker's governance flaws to launch attacks, in order to remind project owners to defend against potential hackers. In addition to these attacks, smart contracts may also encounter four types of censorship attacks: (1) forking, (2) dodging, (3) interference, and (4) quick attacks. In order to prevent these potential attacks, Ed Felten, a professor of computer science at Princeton University, wrote an article titled "How to Prevent Censorship Attacks on Smart Contracts?" The above security issues are aimed at smart contracts, and the Fcoin incident and the theft of 260 million digital currency assets from whales remind people to keep their own private keys and how to keep them safely. For example, Yike’s article “The Easiest Way to Make a BTC Cold Wallet” introduces three methods of making cold wallets using different wallets (bitcoin core, bitcoin wallet, electrum). Big coin holders can take a good look at it. In addition, Wang Yishi wrote a "Guide to Safe Internet Access", reminding everyone about the impact of privacy on the security of digital assets and providing some practical suggestions on how to avoid asset losses. Satoxi's brief comment: Security issues have always existed in the blockchain industry and are also the issues that ordinary users pay the least attention to. The recent security incidents have once again reminded everyone that we might as well start with private key security and privacy security. |
<<: Opinion | Bitcoin price bull run may last 1,000 days
>>: Japan's Finance Minister: China's central bank digital currency could pose great risks
Generally speaking, people would use facial featu...
What is the fortune of people with oval faces? Pe...
In physiognomy, women with hanging needle lines a...
Anyone who wants to get rid of being single must ...
When it comes to the word "credit", eve...
Moles that indicate a woman's brilliant caree...
Moles on the face also have their meanings. So wh...
After many setbacks, it has now been confirmed th...
Author | Hashipi Analysis Team...
Recently, two dynamics in the Bitcoin ecosystem h...
In real life, mean people generally make us feel ...
What to do if you have big nostrils? What impact ...
Filecoin – Introduction to Precommit2 Calculation...
From the perspective of physiognomy, a person'...
In terms of facial features, some can be classifi...