Online Courses
Blockchain Security
Online Courses
Blockchain Security
  • Blockchain Security
  • Fundamentals of Blockchain Security
    • Introduction to blockchain
    • The promises of blockchain
    • Inside the blockchain hype
    • Blockchain structures
    • What is public-key cryptography?
      • How does public-key cryptography work?
      • Public-key cryptography in the blockchain
    • Security assumptions of public-key cryptography
      • Quantum computing
    • Hash function in blockchain
      • Properties of hash functions
      • Hash functions in the blockchain
      • Blockchain security hash key functions
    • Quiz
  • Consensus Algorithm Security
    • Introduction
      • The Byzantine generals problem
      • Security via scarcity
      • Common blockchain consensus algorithms
      • The longest chain rule
    • Proof of work
      • Inside PoW mining
    • Attacking proof of work
      • The 51% attack
      • Denial of service: Artificial difficulty increases
    • Proof of stake
      • Choosing the block creator
    • Attacking PoS consensus
      • XX% attack and the PoS "timebomb"
      • Fake stake attacks
      • Long-range attack
      • Nothing at stake problem
      • Sour milk attack
    • Quiz
  • Blockchain in Action
    • Nodes and network
      • Inside the node
      • How blocks are created
    • Attacking block creation
      • Denial-of-service
      • Frontrunning
      • Selfish mining
      • SPV mining
    • Attacking blockchain nodes
      • Blockchain software misconfiguration
      • Denial of service
      • Malicious transactions
    • Attacking the blockchain network
      • Eclipse attack
      • Routing attack
      • Sybil attack
    • Quiz
  • Smart Contract Security
    • What are smart contracts?
      • Smart contracts
    • General programming vulnerabilities
      • Arithmetic vulnerabilities
      • Right-to-left control character
    • Blockchain vulnerabilities
    • Ethereum vulnerabilities
    • Quiz
  • Beyond the Basics
    • Alternative distributed ledger architectures
      • Introduction to DAGs
      • Introduction to block lattices
      • Introduction to sidechains
    • Second-level blockchain protocols
      • How a state channel works
    • Advanced cryptography in blockchain
      • Multisignatures
      • Zero-knowledge proofs
      • Stealth addresses
      • Ring signatures
      • Commitment schemes
    • Quiz
  • Cumulative Quiz
Powered by GitBook
On this page
  1. Fundamentals of Blockchain Security

Inside the blockchain hype

Blockchain brings several features not available with traditional databases

  • Decentralization

  • Immutability

Blockchain is a technology that allows us to store and manage information in a special way. It is like a digital ledger or a record book that keeps track of transactions or data. What makes blockchain special is that it is decentralized, meaning that there is no central authority controlling it. Instead, the information is stored on many different computers called nodes, and these nodes work together to verify and validate the information.

Think of it like a group of friends who want to keep track of their expenses. Instead of having one person in charge of the record book, they all have a copy of the book, and whenever someone spends money, they all update their copies. This way, everyone has the same information, and it is difficult for someone to cheat or change the records without the others noticing.

However, it isn't a solution to every problem

  • Blockchain doesn't apply to every possible use case

  • Blockchain does not have potential security vulnerabilities

  • Blockchain is currently in it's "dot com boom"

Understanding the security assumptions and vulnerabilities of the blockchain is essential to realistic risk assessment

PreviousThe promises of blockchainNextBlockchain structures

Last updated 6 months ago