51% attack
Adam Back on Three Forms of Centralization That Have Crept Into Bitcoin
At the crux of the block-size limit debate in Bitcoin is an argument between scaling and securing the network. Although raising the block-size limit would allow...
Opinion: On Mining
Decentralization, n. The security assumption that a nineteen-year-old in Hangzhou and someone who is maybe in the UK and maybe not have not yet...
Selfish Mining: A 25 Attack Against the Bitcoin Network
One of Bitcoin’s core security guarantees is that, for an attacker to be able to successfully interfere with the Bitcoin network and block and...
ASIC Mining Updates: ASICMiner Deploying, Butterfly At CES
After over three months of delays from all major competitors, it seems as though the race to develop the first ASIC-based Bitcoin mining computer...
Vitalik Buterin Explains Bitcoin Terminology Part II
The Network and the BlockchainThe Bitcoin network is the network of computers through which Bitcoin transactions are broadcasted and which maintains the public blockchain. Sometimes,...
- Advertisment -