Category: DFINITY

DFINITY Scholarship Winners Fall 2018

DFINITY offers Scholarships to individual researchers or groups that work on topics that are related to DFINITY’s technology. I’ve talked to all three winners of the current scholarship program in the fall of 2018. Please join our conversation to find out what they are working on, how they first heard about the program and who ...

Intro to Proof Techniques: Proofs. Part 3 of 3

This is Part 3 of my conversation with Robert, who gives an overview of the steps to actually prove that the desired Chain Properties hold in the given model. Starting from protocol events and their relative timing, one can draw interim conclusions that finally allow to make the proofs. Video Transcript: Cédric: Okay. So we’ve gone ...

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

This is Part 2 of my conversation with Robert about the System Model and the Threat Model that are used for the proofs in the DFINITY Consensus Whitepaper. In particular, Robert explains the assumptions about network synchrony and Byzantine faults. Video Transcript: Robert: So let’s jump to the next important thing in our proof system, ...

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

This is Part 1 of my conversation with Robert, who explains on the whiteboard what provable properties a blockchain must have to provide a finalized total order on transactions. The 3 fundamental Chain Properties are called Chain Growth, Chain Consistency, and Chain Quality. Video Transcript: Welcome back to yet another episode of Inside DFINITY. I’m back ...

Arthur and Cédric on the “Inside DFINITY” Couch

Arthur and I sat down to have a pretty wide-ranging conversation about his upcoming trip to Asia, what makes good events and much more. Video Transcript: Arthur: The idea behind why I assembled this gear was because I’m about to go on quite an extensive trip. Cédric: Where are you headed to? Arthur: Beginning with Dubai, a ...

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

This is Part 2 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Nothing-at-Stake means that in Proof of Stake it is basically cost-free to mine blocks on multiple forks. Notarization enables the quick convergence of forking chains and the equivocation gets penalized. Video Transcript: Robert: ...

Attack Vectors: Selfish Mining Attack. Part 1 of 3

This is Part 1 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Selfish Mining involves creating a chain in secret and releasing it, which depends on the progress of the official chain. Block withholding in DFINITY is prevented by the notarization and the BlockTime delay. ...

How to Start Learning Blockchain?

“How do I get started learning more about blockchain?” is one of the questions I hear most often. Elena spent a couple of weeks working from the DFINITY office and was inspired to learn more. In this video, we talk about how she approached it and what tools she used. Dive in if you’re also ...

DFINITY: A Hack-Proof Platform. Talk with Dominic WILLIAMS, Part 3 of 3

This is Part 3 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

DFINITY: Where We’re Heading. Talk with Dominic WILLIAMS, Part 2 of 3

This is Part 2 of my conversation with Dominic Williams. Dom and I sat down to talk about how DFINITY got started, how he came up with the name, and most importantly: where we’re heading to. Join our conversation about both the milestones that we’ve reached and the ones that lay in front of us! ...

If you want to stay up to date, please subscribe