Category: DFINITY Team

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

This is Part 2 of my conversation with Robert about the System Model and the Threat Model that are used for the proofs in the DFINITY Consensus Whitepaper. In particular, Robert explains the assumptions about network synchrony and Byzantine faults. Video Transcript: Robert: So let’s jump to the next important thing in our proof system, ...

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

This is Part 1 of my conversation with Robert, who explains on the whiteboard what provable properties a blockchain must have to provide a finalized total order on transactions. The 3 fundamental Chain Properties are called Chain Growth, Chain Consistency, and Chain Quality. Video Transcript: Welcome back to yet another episode of Inside DFINITY. I’m back ...

Arthur and Cédric on the “Inside DFINITY” Couch

Arthur and I sat down to have a pretty wide-ranging conversation about his upcoming trip to Asia, what makes good events and much more. Video Transcript: Arthur: The idea behind why I assembled this gear was because I’m about to go on quite an extensive trip. Cédric: Where are you headed to? Arthur: Beginning with Dubai, a ...

Attack Vectors: Large-Range Attacks. Part 3 of 3

This is Part 3 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. In a Long-Range Attack, the attacker buys old (unused) secret keys to overwrite history. By requiring a notarization on each block and getting rid of old keys, DFINITY makes such attacks much harder. ...

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

This is Part 2 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Nothing-at-Stake means that in Proof of Stake it is basically cost-free to mine blocks on multiple forks. Notarization enables the quick convergence of forking chains and the equivocation gets penalized. Video Transcript: Robert: ...

Attack Vectors: Selfish Mining Attack. Part 1 of 3

This is Part 1 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Selfish Mining involves creating a chain in secret and releasing it, which depends on the progress of the official chain. Block withholding in DFINITY is prevented by the notarization and the BlockTime delay. ...

DFINITY: A Hack-Proof Platform. Talk with Dominic WILLIAMS, Part 3 of 3

This is Part 3 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

DFINITY: Where We’re Heading. Talk with Dominic WILLIAMS, Part 2 of 3

This is Part 2 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

DFINITY: How It Got Started. Talk with Dominic WILLIAMS, Part 1 of 3

This is Part 1 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

Why build on DFINITY? Mission Control Q&A with Enzo

Enzo and I got together to answer the questions we received in Mission Control. If you’d like us to answer your questions in the next Q&A session, please submit them here: https://goo.gl/forms/qOQgEaLzZOgKJcx92. Video Transcript: Hi. Welcome to yet another episode of Inside DFINITY. Today we’re having another Q&A; episode; we’re going to be answering questions ...

If you want to stay up to date, please subscribe