Cédric Waldburger

Cédric Waldburger

Founder of Sendtask.io 🚀. I'm passionate about startups 👨‍🚀. I live out of a carry-on 💼. I own 64 things. They're all black.

Intro to Proof Techniques: Proofs. Part 3 of 3

This is Part 3 of my conversation with Robert, who gives an overview of the steps to actually prove that the desired Chain Properties hold in the given model. Starting from protocol events and their relative timing, one can draw interim conclusions that finally allow to make the proofs. Video Transcript: Cédric: Okay. So we’ve gone ...

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

This is Part 2 of my conversation with Robert about the System Model and the Threat Model that are used for the proofs in the DFINITY Consensus Whitepaper. In particular, Robert explains the assumptions about network synchrony and Byzantine faults. Video Transcript: Robert: So let’s jump to the next important thing in our proof system, ...

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

This is Part 1 of my conversation with Robert, who explains on the whiteboard what provable properties a blockchain must have to provide a finalized total order on transactions. The 3 fundamental Chain Properties are called Chain Growth, Chain Consistency, and Chain Quality. Video Transcript: Welcome back to yet another episode of Inside DFINITY. I’m back ...

14 Day Water-Only Fast

My video from Day 12 of 14-day water-only fast. Two weeks ago I decided to do another one of my much-loved experiments 🙂 I was in Northern Italy with my EO Forum. I had recently heard that a friend of mine had been on a seven-day juice fast. I was impressed when we talked on ...

Attack Vectors: Large-Range Attacks. Part 3 of 3

This is Part 3 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. In a Long-Range Attack, the attacker buys old (unused) secret keys to overwrite history. By requiring a notarization on each block and getting rid of old keys, DFINITY makes such attacks much harder. ...

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

This is Part 2 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Nothing-at-Stake means that in Proof of Stake it is basically cost-free to mine blocks on multiple forks. Notarization enables the quick convergence of forking chains and the equivocation gets penalized. Video Transcript: Robert: ...

Attack Vectors: Selfish Mining Attack. Part 1 of 3

This is Part 1 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Selfish Mining involves creating a chain in secret and releasing it, which depends on the progress of the official chain. Block withholding in DFINITY is prevented by the notarization and the BlockTime delay. ...

My First Meal After a 14 Day Water-Only Fast 😋

Two weeks ago I decided to do another one of my much-loved experiments 🙂 I was in Northern Italy with my EO Forum. I had recently heard that a friend of mine had been on a seven-day juice fast. I was impressed when we talked on his fifth day and he sounded very energetic. I ...

How to Start Learning Blockchain?

“How do I get started learning more about blockchain?” is one of the questions I hear most often. Elena spent a couple of weeks working from the DFINITY office and was inspired to learn more. In this video, we talk about how she approached it and what tools she used. Dive in if you’re also ...

DFINITY: A Hack-Proof Platform. Talk with Dominic WILLIAMS, Part 3 of 3

This is Part 3 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

If you want to stay up to date, please subscribe