Category: DFINITY Team

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

This is Part 2 of my conversation with Robert about the System Model and the Threat Model that are used for the proofs in the DFINITY Consensus Whitepaper. In particular, Robert explains the assumptions about network synchrony and Byzantine faults. Video Transcript: Robert: So let’s jump to the next important thing in our proof system, ...

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

This is Part 1 of my conversation with Robert, who explains on the whiteboard what provable properties a blockchain must have to provide a finalized total order on transactions. The 3 fundamental Chain Properties are called Chain Growth, Chain Consistency, and Chain Quality. Video Transcript: Welcome back to yet another episode of Inside DFINITY. I’m back ...

Arthur and Cédric on the “Inside DFINITY” Couch

Arthur and I sat down to have a pretty wide-ranging conversation about his upcoming trip to Asia, what makes good events and much more. Video Transcript: Arthur: The idea behind why I assembled this gear was because I’m about to go on quite an extensive trip. Cédric: Where are you headed to? Arthur: Beginning with Dubai, a ...

Attack Vectors: Large-Range Attacks. Part 3 of 3

This is Part 3 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. In a Long-Range Attack, the attacker buys old (unused) secret keys to overwrite history. By requiring a notarization on each block and getting rid of old keys, DFINITY makes such attacks much harder. ...

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

This is Part 2 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Nothing-at-Stake means that in Proof of Stake it is basically cost-free to mine blocks on multiple forks. Notarization enables the quick convergence of forking chains and the equivocation gets penalized. Video Transcript: Robert: ...

Attack Vectors: Selfish Mining Attack. Part 1 of 3

This is Part 1 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Selfish Mining involves creating a chain in secret and releasing it, which depends on the progress of the official chain. Block withholding in DFINITY is prevented by the notarization and the BlockTime delay. ...

DFINITY: A Hack-Proof Platform. Talk with Dominic WILLIAMS, Part 3 of 3

This is Part 3 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

DFINITY: Where We’re Heading. Talk with Dominic WILLIAMS, Part 2 of 3

This is Part 2 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

DFINITY: How It Got Started. Talk with Dominic WILLIAMS, Part 1 of 3

This is Part 1 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

People of DFINITY: Norton WANG

Norton and I sat down to talk about where he’s from, how he first learnt about crypto and what he works on for DFINITY. We finish with a quick view into the state of the DFINITY SDK. Video Transcript: Cédric: Hey, Norton. Hey, how’s it going? Thanks for taking the time. Norton: Absolutely. Cédric: Another episode ...

If you want to stay up to date, please subscribe