自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

FeelTouch Labs

Best or Nothing!

  • 博客(21)
  • 资源 (35)
  • 收藏
  • 关注

原创 阿里CEO盒马内部演讲实录:跑得久才是最关键的

摘要价值观不是用来挂在墙上的,是不知不觉融入思考和行为之中的。 好的企业文化,首先是做好人,做“好”人和做好“人”。 商业模式创新是创造生产力,组织能力创新是创造新的生产关系,最终交汇在人上点燃。文化是溶解剂和催化剂,能把所有东西融在一起。 阿里文化的内核原浆就是相信人和社会的美好。 以后谁对谁都不要叫老板,直接叫花名,花名没有叫本名。 我很不赞同“一将功成万骨枯”,我们绝对不要做...

2019-03-30 23:57:03 1719

转载 Java 最常见的 200+ 面试题:面试必备

这份面试清单是从我 2015 年做了 TeamLeader 之后开始收集的,一方面是给公司招聘用,另一方面是想用它来挖掘在 Java 技术栈中,还有那些知识点是我不知道的,我想找到这些技术盲点,然后修复它,以此来提高自己的技术水平。虽然我是从 2009 年就开始参加编程工作了,但我依旧觉得自己现在要学的东西很多,并且学习这些知识,让我很有成就感和满足感,那所以何乐而不为呢?说回面试的事,这份面...

2019-03-29 00:42:03 281

转载 MongoDB内存使用分析和优化

MongoDB内存占用点Mongod 进程启动后,除了跟普通进程一样,加载 binary、依赖的各种library 到内存,其作为一个DBMS,还需要负责客户端连接管理,请求处理,数据库元数据、存储引擎等很多工作,这些工作都涉及内存的分配与释放,默认情况下,MongoDB 使用 Google tcmalloc 作为内存分配器,内存占用的主要是「存储引擎」与 「客户端连接及请求的处理」。存储...

2019-03-26 00:26:42 3960

原创 撒花,庆祝CSDN博客专家和独立域名同时申请成功

2019.03.25 是一个小有意义的日子,同时申请CSDN博客专家和独立域名成功,进一步说是申请独立域名催生了申请博客专家,无论怎么说,这都是一个新篇章开启了!随后的时间,我将分享更多高质量、有深度的原创技术博文,为更多的编程爱好者和自己的技术以及研发管理能力的持续提升贡献一份力量!独立域名:https://feeler.blog.csdn.net/ 让零星知识的力量聚集成最灿的...

2019-03-25 23:53:33 432

转载 Spring Series---事务中JDBC是否自动提交解析

自动提交默认情况下,数据库处于自动提交模式。每一条语句处于一个单独的事务中,在这条语句执行完毕时,如果执行成功则隐式的提交事务,如果执行失败则隐式的回滚事务。对于正常的事务管理,是一组相关的操作处于一个事务之中,因此必须关闭数据库的自动提交模式。不过,这个我们不用担心,spring会将底层连接的自动提交特性设置为false。org/springframework/jdbc/dataso...

2019-03-25 01:00:09 1367

转载 MongoDB 最佳实践和场景避坑指南

Mongodb相对hbase、MySQL来说,有哪些优势?这里就简单说一下题主说的几个数据库中,mongodb优势的地方vs hbase:hbase是基于row key存储宽列的一款nosql,乍一看结构类似mongodb的_id主键和可变长的列数量。具体的原理和区别这里不展开。mongodb的优势在于轻量化部署非常简单,不用像hbase那样搭一整套hadoop集群,即开即用。...

2019-03-24 00:26:55 1652

转载 MongoDB 整合SpringBoot实践

MongoDB 简介MongoDB 是非关系型数据库中,最接近关系型数据库的,文档型数据库。它支持的查询功能非常强大。MongoDB 是为快速开发互联网Web应用而设计的数据库系统。他的数据模型是面向文档的,这种文档是一种类似于JSON的结构,准确来说是一种支持二进制的BSON(Binary JSON)结构。非关系性数据库非关系性数据库 也被称为 NoSQL(Not only sql...

2019-03-23 23:55:23 734

原创 Java深海拾遗系列(3)---JDK8中的ArrayDeque源码分析

ArrayDeque类视图简介从类视图可以看出,ArrayDeque实现了Deque接口,Deque接口继承了Queue接口,Queue接口继承自顶级接口集合类Collection。Queue 也是 Java 集合框架中定义的一种接口,直接继承自 Collection 接口。除了基本的 Collection 接口规定测操作外,Queue 接口还定义一组针对队列的特殊操作。通常来说,...

2019-03-23 21:50:09 420

原创 依赖管理利器---Spring IO Platform解决Spring组合依赖问题实战

Spring IO Platform简介Spring IO Platform,主要是解决依赖版本冲突问题,简单的可以认为是一个依赖维护平台,该平台将相关依赖汇聚到一起,针对每个依赖,都提供了一个版本号;这些版本对应的依赖都是经过测试的,可以保证一起正常使用。Spring IO Platform优势困境:例如在使用Spring的时候,经常会使用到第三方库,一般大家都是根据经验挑选一个版本...

2019-03-21 01:07:54 981

原创 Redis性能提高之批量和管道

批量的意义Redis协议采取的是客户端-服务器方式,即在一次round trip中,客户端发送一条指令,服务端解析指令并执行,然后向客户端返回结果。这是一种典型的tcp交互方式。粗略的分,客户端发起一次Redis请求主要有如下开销:socket IO导致的上下文切换开销熟悉OS/Linux的童鞋都知道,一次redis请求在客户端和服务端分别至少会存在一次read()和一次write...

2019-03-20 22:55:51 1482

原创 Redis数据操作长延迟分析

1. 长耗时命令引起延迟Redis绝大多数读写命令的时间复杂度都在O(1)到O(N)之间。O(1)的命令是安全的,O(N)命令在使用时需要注意,如果N的数量级不可预知,则应避免使用。例如对一个field数未知的Hash数据执行HGETALL/HKEYS/HVALS命令,通常来说这些命令执行的很快,但如果这个Hash中的field数量极多,耗时就会成倍增长。针对长耗时的最佳实践:不要把...

2019-03-20 22:55:25 783

原创 Redis性能分析和运维工具

目录redis-benchmark工具monitor命令slowlog命令info命令Redis高阶用法进入Redis Deepen系列redis-benchmark工具作用: 可用于redis基准信息,服务器性能检测$ redis-benchmark -h localhost -p 6379 -c 100 -n 100000100个并发连接,10000...

2019-03-20 00:40:05 758

原创 MongoDB writeConcern和readConcern原理

目录readConcernreadConcern作用readConcern原理readConcern须知readPreferencewriteConcernwriteConcern选项{w: "majority"}解析readConcernreadConcern作用MongoDB 可以利用readConcern来灵活的定制读策略,决定读取数据时,...

2019-03-20 00:19:58 2128

转载 Kata Containers新一代Docker容器技术分析介绍

当前容器运行的最大支撑平台是私有云,也就是在私有云上的虚拟机中运行容器实例。一个虚拟机上可运行多个用户的、不同应用的容器实例,不同实例之间共享同一个虚拟机操作系统内核并采用 Namespaces 来隔离。Kata 容器运行时是采用轻量级虚拟机来运行某一个用户的、一个应用的一个或多个容器实例, 这样的好处是利用不同用户、不同应用之间,都是使用独占的虚拟机来隔离容器,不会共享同一操作...

2019-03-18 01:21:49 4486

转载 MongoDB的mongo命令使用完整版

成功启动MongoDB后,再打开一个命令行窗口输入mongo,就可以进行数据库的一些操作。输入help可以看到基本操作命令:show dbs:显示数据库列表show collections:显示当前数据库中的集合(类似关系数据库中的表)show users:显示用户use <db name>:切换当前数据库,这和MS-SQL里面的意思一样db.help():显...

2019-03-13 08:19:36 514

原创 自动化测试工具分析和总结

目录JUnit简介Mockito简介RobolectricSelenium简介JUnit简介JUnit是一个Java语言的单元测试框架。它由Kent Beck和Erich Gamma建立,逐渐成为源于Kent Beck的sUnit的xUnit家族中最为成功的一个JUnit有它自己的JUnit扩展生态圈。多数Java的开发环境都已经集成了JUnit作为单元测...

2019-03-11 01:13:18 1555

原创 全链路性能压测工具分析和总结

服务端压测memtier_benchmarkmemtier_benchmark是Redis Labs推出的一款命令行工具,它能够产生各种各样的流量模式,可以对Memcached和Redis实例进行基准测试。这个工具提供了丰富的自定义选项和报表功能,通过命令行界面就能够轻松地使用。这个工具的一些优点如下所述: memtier_benchmark同时支持Redis和Memcached(二...

2019-03-10 21:30:21 3516

原创 RSocket一种新的响应式应用新协议

简介RSocket是在华盛顿特区举行的SpringOne平台会议上宣布的,是一种新的第7层语言无关的应用网络协议。它是一种基于Reactive Streams背压的双向,多路复用,基于消息的二进制协议。它由Facebook,Netifi和Pivotal等工程师开发,提供Java,JavaScript,C ++和Kotlin等实现。开源RSocket专为服务而设计。它是一种面向连接的消息...

2019-03-07 00:45:33 2346 1

原创 Redis客户端选型再分析

前言当用户读到该篇文章时,大概率都在使用或准备即将使用Redis以及Jedis,这几乎成了共识,尤其在SpringBoot 的良好支持下,采用Jedis几乎成为了顺理成章的事,尽管如此,我们还是应该把眼界放得再开些。官方推荐的有三种:Jedis、Redisson和lettuce。Jedis轻量,简洁,便于集成和改造 支持连接池 支持pipelining、事务、LUA Scrip...

2019-03-05 00:00:05 717

原创 Redis 集群到底支持不支持批处理指令MGET等

目前,这不是一个确定的答案,对于不同集群的实现方式其支持度也是不一样的原生Redis Cluster 3.* 和 4.*版本集群3.0 不支持,即使在某些客户端下返回了值,很可能仅仅只是某一个节点的值4.0 仅支持相同slot,key不能保证在相同slot还是没用参考:Redis阿里云Redis Cluster支持MGET MSET HMGET HMSET指令受限MG...

2019-03-04 00:26:20 10158

原创 Redis集群实现方案选型分析

Redis集群方案1. 客户端分片实现集群2.中间代理层实现集群3.Server层面本身支持集群4.第三方:实际是上述三中的进一步增强尽管实现方案多样,其实质都是通过底层分片突破Redis单实例内存限制和增加可靠性客户端分片客户端分片是把分片的逻辑放在Redis客户端实现,通过Redis客户端预先定义好的路由规则,把对Key的访问转发到不同的Redis实例中,最后把返...

2019-03-03 22:25:59 1361

Natural Language Processing with Deep Learning CS224N/Ling284

1.The foundations of the effective modern methods for deep learning applied to NLP • Basics first: Word vectors, feed-forward networks, recurrent networks, attention • Then key methods used in NLP in 2024: transformers, encoder-decoder models, pretraining, post-training (RLHF, SFT), efficient adaptation, model interpretability, language model agents, etc. 2. A big picture understanding of human languages and the difficulties in understanding and producing them via computers 3. An understandin

2024-09-09

RFC9220 - HTTP Datagrams and the Capsule Protocol

This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection. In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.

2024-08-02

RFC9297 - Bootstrapping WebSockets with HTTP/3

The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.

2024-08-02

RFC9114 - HTTP/3

The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.

2024-08-02

RFC9000 - QUIC: A UDP-Based Multiplexed and Secure Transport

This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.

2024-08-02

RFC8446 -The Transport Layer Security (TLS) Protocol Version 1.3

Abstract This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations. Status of This Memo This is an Internet Standards Track document. This document is a product o

2024-08-02

Web3+Decentralized+去中心化+存储

Storage parameter flexibility • Storage permanence • Redundancy persistence • Data transmission incentivization • Universality of storage tracking Filecoin’s tokenomics support growing the total network’s storage space. Crust’s tokenomics ensure hyper-redundancy with fast retrieval speeds. Sia is all about privacy Arweave is all about permanence Storj’s business model seems to heavily factor in their billing and payment approach. Swarm’s bonding curve model

2024-04-30

Chainbase+Web3+APi+Data warehouse

1.Chain API Service:提供安全稳定的多链节点 JSONRPC 集群⽀持,轻松访问多链⽹络 2.Web3 API Service:⽀持多种协议索引,快速⽀持业务应⽤场景(如Token、NFT、DeFi、Domain...)数据查询 3.All-In-One Dashboard:通过⼀站式控制台完成创建、调试、监控和运维 Web3 应⽤程序

2024-04-30

Graph+Web3+检索

1.Substreams 是 The Graph Network 的数据服务世界中即将推出的服务之一,它允许您以毫秒级的延迟查询 Solana 历史数据和实时数据。 2.The Graph 是 Web3 的核心开发者工具及中间件,作为去中心化网络的索引查询层,对区块链数据进行结构化和分类,使用户可以轻松高效地对其进行检索。

2024-04-30

Web3+Nostr+区块链+去中心化+Relay+抗审查

1.Notes and Other Stuff Transmitted by Relays 2.由“中继器”传输的“笔记”和“其它东西 3.不依赖于任何可信任(trusted)的中心化服务器,因此具有“韧性/可迅 速恢复性”(resilient) 4.基于公钥密码学的“密钥和签名”原理,所以它防篡改 5.不需要依赖P2P技术就能运行

2024-04-30

GO 中 Chan 实现原理分享

本文聚焦: 1.chan是什么 2.chan的底层数据结构 3.chan的读写基本流程 4.与sync的区别

2024-01-29

storj dcs video use case

Video Storage & Streaming

2023-12-25

Aurora - 去中心化的以太坊 Layer2

Aurora is a L2 Network

2023-12-25

闪电贷的攻防和智能合约审计

闪电贷和闪电兑,以及智能合约的安全防范

2023-12-25

Poly Network 技术架构

To build the next generation internet

2023-12-24

VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK DRAFT

Present-day blockchain architectures all suffer from a number of issues not least practical means of extensibility and scalability. We believe this stems from tying two very important parts of the consensus architecture, namely canonicality and validity, too closely together. This paper introduces an architecture, the heterogeneous multi-chain, which fundamentally sets the two apart.

2023-12-24

Security audit report for imtoken wallet

This security audit is a requested service authorized by the client. The service is mainly about application penetration testing which helps to find the vulnerabilities and threats of the target. All the penetration testing items are done by simulating the real world malicious attacks against the target, which mimics human hackers’ activities by manual penetration testing with automated tools.

2023-12-24

Decentraland is a blockchain-based virtual world

Decentraland is a virtual reality platform powered by the Ethereum blockchain. Users can create, experience, and monetize content and applications. Land in Decentraland is permanently owned by the community, giving them full control over their creations. Users claim ownership of virtual land on a blockchain-based ledger of parcels. Landowners control what content is published to their portion of land, which is identified by a set of cartesian coordinates (x,y). Contents can range from static 3D

2023-12-24

The Bitcoin Standard

The Bitcoin Standard Bitcoin的表演

2023-12-24

力场的定位是一个以公链共建挖矿为核心的社区平台以及UGC平台

力场的定位是一个以公链共建挖矿为核心的社区平台以及 UGC(用户生成贡 献)平台。力场的愿景是成为公链生态第一社区,无力场,不公链。 力场的使命是赋能公链生态,以(贡献)行为挖矿为切入点,形成公链、KOL、 用户、Dapp 共生、共建、共利的区块链用户社区。

2023-12-24

A Novel Metastable Consensus Protocol Family for Cryptocurrencie

This paper introduces a new family of leaderless Byzantine fault tolerance protocols, built on a metastable mechanism. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries, while their concurrent nature enables them to achieve high throughput and scalability.

2023-12-24

Measuring Ethereum Network Peers

Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum—and blockchain systems in general—have been widely-studied, most analysis has focused on application level features of these systems such as cryptographic mining challenges, smart contract semantics, or block mining operators.

2023-12-24

Firework Games White Paper

Firework Games will be the most advanced and forward-looking blockchain game platform. Our vision is to provide an open and inclusive diverse game world based on the pure blockchain technology, which will change the game industry in modern society. Everyone is freely allowed to create, to play and to enjoy his own role in the parallel world.

2023-12-24

CS251 Final Exam 2021

You may use any (non-human) resource to answer the questions. You may not collaborate with others.

2023-12-24

Generic Construction of Ring Signatures with Efficient

We introduce a novel generic ring signature construction, called DualRing, which can be built from several canonical identification schemes (such as Schnorr identification).DualRing differs from the classical ring signatures by its formation of two rings: a ring of commitments and a ring of challenges. It has a structural difference from the common ring signature approaches based on accumulators or zero-knowledge proofs of the signer index.

2023-12-24

The Gridex Protocol

The Gridex Protocol is a permissionless and non-custodial trading protocol consisting of a set of persistent, non-upgradable smart contracts on the Ethereum blockchain. Unlike the current mainstream decentralized exchanges based on the Automated Market Maker (AMM) model, Gridex is based on order books. With our novel Grid Maker Order Book (GMOB) model, we have significantly reduced the resource consumption of running an order book based system, allowing us to deploy and run it on the Ethereum.

2023-12-24

Efficient Zero-Knowledge Arguments for Arithmetic Circuits

We provide a zero-knowledge argument for arithmetic circuit satisfiability with a communication complexity that grows logarithmically in the size of the circuit. The round complexity is also logarithmic and for an arithmetic circuit with fan-in 2 gates the computation of the prover and verifier is linear in the size of the circuit. The soundness of our argument relies solely on the well-established discrete logarithm assumption in prime order groups.

2023-12-24

KishuInu Whitepaper

$KISHU is an ERC20 token which started on the Ethereum blockchain April 17, 2021. The max supply is 100 quadrillion and one of its key functionalities is its decentralized usage rewards mechanism. For every active user transaction a 2% $KISHU reward is granted to holders’ decentralized wallets only, fostering a healthy distrubuted network and community usage. The more $KISHU is actively used, the more rewards are granted!

2023-12-24

On the Instability of Bitcoin Without the Block Reward

Bitcoin provides two incentives for miners: block rewards and transaction fees. The former accounts for the vast majority of miner revenues at the beginning of the system, but it is expected to transition to the latter as the block rewards dwindle. There has been an implicit belief that whether miners are paid by block rewards or transaction fees does not affect the security of the block chain.

2023-12-24

Shorter Proofs for Privacy-Enhanced Distributed Ledger

We present a new short zero-knowledge argument for the range proof and the arithmetic circuits without a trusted setup. In particular, the proof size of our protocol is the shortest of the category of proof systems with a trustless setup. More concretely, when proving a committed value is a positive integer less than 64 bits, except for negligible error in the 128-bit security parameter, the proof size is 576 byte long, which is of 85.7% size of the previous shortest one due to Bunzetal.

2023-12-24

Attacking Threshold Wallets

Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights across multiple parties when issuing blockchain transactions. These provide greater assurance against insider fraud, and are sometimes seen as an alternative to methods using a trusted execution environment to issue the signature. This new class of applications motivated researchers to discover better protocols, entrepreneurs to create start-up companies, and large organizations to deploy TSS-based.

2023-12-23

This paper provides an architectural overview of the Avalanche

Avalanche is a high-performance, scalable, customizable, and secure blockchain platform. It targets three broad use cases: 15 – Building application-specific blockchains, spanning permissioned (private) and permissionless (public) deployments. – Building and launching highly scalable and decentralized applications (Dapps). – Building arbitrarily complex digital assets with custom rules, covenants, and riders (smart assets).

2023-12-23

Avalanche Native Token ($AVAX) Dynamics

This paper discusses the key implementation details, in particular the token economics (tokenomics), of the native token of the Avalanche platform, called 5 $AVAX. The native token secures the network, pays for fees, and provides the basic unit of account between the multiple blockchains deployed on the larger Avalanche network. For additional details on Avalanche, which serves as a versatile and universal platform, allowing anyone to launch new blockchains with their own rules, virtual machine

2023-12-23

ZKSwap是一个基于 ZK-Rollup 的 Layer2 代币Swap协议

是一种基于 ZK-Rollup 技术的 Layer-2 AMM 去中心化交易协议 ZKSwap,在 Layer-2 上实现了 uniswap 的所有功能,在保证去中心化交易的核心 价值的同时,实现实时交易,把 Uniswap 的 TPS(每秒可以处理的交易数量) 提升了多个数量级,同时交易的过程几乎不需要消耗任何 Gas 费用。 ZKSwap 系统由链上智能合约,链下 ZKSwap Server,零知识证明系统和前端 用户界面组成。

2023-12-23

ZEND White Paper

You agree that you are acquiring ZEND to participate in zkLend and to obtain services on the ecosystem thereon. The Company, the Distributor and their respective affiliates would develop and contribute to the underlying source code for zkLend. The Company is acting solely as an arms’ length third party in relation to the ZEND distribution, and not in the capacity as a financial advisor or fiduciary of any person with regard to the distribution of ZEND.

2023-12-23

KZen Curv Security Audit

KZen Curv is a library written in Rust providing low-level elliptic curve cryptography functionalities (ECC), as well as higher-level protocols such as key-exchange, secret sharing, zero-knowledge, and multi-party computation. KZen Curv 是一个用 Rust 编写的库,提供低级椭圆曲线加密 功能 (ECC) 以及更高级别的协议,例如密钥交换、秘密 共享、零知识、多方计算。

2023-12-23

为什么虚拟资产值得投资:元宇宙虚拟地产报告

本篇报告回顾了2021年Metaverse虚拟地产商生态的发展,并讨论了与之相关的主要市场趋势。这些趋势包括:主流传统玩家的入场;Metaverse技术的商业应用(包括游戏和应用);以及非同质化代币NFT对于整个整体元宇宙的影响。

2023-10-27

元宇宙:未来数字绿洲入口已打开

元宇宙是与现实世界高度互通的虚拟世界,具有同步和拟真、开源和创 造、永续、闭环经济系统四大核心属性。元宇宙的兴起将伴随着 AR/VR、 云计算、AI、5G 等技术的进化,人类对虚拟世界的构建和发展将造就互 联网的终极形态——METAVERSE。随着 ROBLOX 上市受到追捧,元宇宙 正从概念走向现实,国内对标公司或如雨后春笋般出现,产业链发展值 得重视。

2023-10-27

Code Assessment of Liquidations 2.0 Smart Contracts

First and foremost we would like to thank the Maker Foundation for giving us the opportunity to assess the current state of their Liquidations 2.0 system. This document outlines the findings, limitations, and methodology of our assessment. Initially, our code assessment resulted in a number of findings regarding security and correctness. After the submission of the intermediate reports all findings have been resolved. These have been marked accordingly and can be found in the Resolved Findings s

2023-10-27

Scalable and Probabilistic Leaderless BFT Consensus through Meta

This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around a metastable mechanism via network subsampling. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries while their concurrent and leaderless nature enables them to achieve high throughput and scalability. Unlike blockchains that rely on proof-of-work, they are quiesce

2023-10-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除