Home
Search results “Cryptographic keys management cocoa”
Ruby Snack #56: Let's Encrypt
 
07:41
Let's Encrypt is an awesome free service for basic SSL certificates. With the help of a cron job, it really is a set-it -and-forget-it service! To download the presentation, visit: https://rubythursday.com/episodes/ruby-snack-56-lets-encrypt
Views: 668 RubyThursday
Blockchain Security Tools
 
16:23
Introduction Basic blockchain architecture as it pertains to block creation and consensus mechanisms is very sound. The algorithms used to accomplish the cryptographic functions might be questionable. Hence special consideration should be given to key management, key length, hashing algorithms, and the environment that activity is conducted in. To date none of the block chains have been hacked or maliciously modified, hence from that aspect we are safe. If you consider blockchain mechanisms to be the foundation, which are unhackable at this point, the next few layers above is where the problems start. In this show, I talk about various blockchain security tools currently available. Basic Blockchain Eco system The illustration below depicts the different layers that in my opinion comprise a blockchain eco system. Layer 1: Consensus and Cryptographic functions. Layer 2: Virtual processor executing code that executes smart contracts. For Ethereum this would be Ethereum Virtual Machine(EVM) executing compiled solidity code. For bitcoin blockchain this would be Virtual Processor executing script code. Layer 3: Application Programming Interface(API) this performs multiple functions such as: • Converting smart contract code to bytecode • Wallet requests for transaction processing • Exposing blockchain explorer capability Layer4: This is where outside world interacts with Layers 3, 2, and 1. Weakest Link The weakest link is Layer 4. This is where all the problems start. First, the wallets, if the owner does not protect the private key and passphrase or they are exposed, all the crypto held in that wallet can be lost. Second, the smart contracts, if the smart contract code is not written properly then the inherent compiled byte code that lives on the blockchain will have vulnerabilities. If some one is able to exploit this particular vulnerability the impacts can be very damaging. Just like the DAO hack which lead to over $60m getting stolen. Some solutions Since smart contract is just code, it has to follow secure coding practices. Although there are a lot of secure coding methodologies, and tools available for conventional programming languages such as C, C++, C#, Java, JavaScript, etc., there was nothing available for newly created smart contract languages such as solidity and script. With the lack of secure coding practices & tools, coupled with inexperienced programmers in these new languages, it was a disaster waiting to happen. Tools Various organizations are now bringing out blockchain security tools to address this void. Here is the list: • A platform should support conventional programming languages to ensure existing secure coding practices can be leveraged. • OpenZeppelin has created an open framework of reusable and secure smart contracts in the Solidity language. • Trailofbits has created following tools: ○ A repository that contains examples of common Ethereum smart contract vulnerabilities, including real code. ○ "Slither combines a set of proprietary static analyses on Solidity that detect common mistakes such as bugs in reentrancy, constructors, method access, and more. Run Slither as you develop, on every new checkin of code." ○ "Echidna applies next-generation smart fuzzing to EVM bytecode. Write Echidna tests for your code after you complete new features. It provides simple, high coverage unit tests that discover security bugs. Until your app has 80+% coverage with Echidna, don’t consider it complete". ○ "Manticore uses symbolic execution to simulate complex multi-contract and multi-transaction attacks against EVM bytecode. Once your app is functional, write Manticore tests to discover hidden, unexpected, or dangerous states that it can enter. Manticore enumerates the execution states of your contract and verifies critical functionality". ○ They have also created some reversing tools just like Porosity below which converts bytecode to solidity code. • NCC Group had compiled a DASP (Decentralized Application Security Project) Top10 list • Porosity, a decompiler and smart contract auditing tool for Ethereum smart-contracts.
Episode #006 -  attr_encrypted
 
04:12
Protecting your data within your database has never been easier. With attr_encrypted, you can easily add a level of security to your application without much refactoring. https://www.driftingruby.com/episodes/attr_encrypted
Views: 986 Drifting Ruby
The Four Minute Morning {Bitcoin - Multiple TimeFrames} 2018.05.04
 
07:03
CONTENT DISCLAIMER: I am not a financial advisor nor do I have a CMT certificate or anything of the like. Any decisions you make on in your investing is always based on the risk and reward you desire. If you lose then you have to take the loss and if you win than the profits or winnings are yours. I would suggest for you to do your own research, manage risk or any of the likes, but I am not suggesting anything rather I am explaining what I am doing, what I would do or how I interpret the information that I am presenting. Furthermore, I rarely will ever take recommendations for specific crypto currency codes because the majority of the content I want to focus on is the main popular markets like Bitcoin and Silver and the content I show is what I feel I like to choose and focus on education style subjects rather than how a particular chart is shaped at a current time. I do accept gifts on this channel, and if you really want to have an in depth look at a particular code on multiple time frames both against BTC and USD and you send a gift than I most certainly would put one out. Leave a comment that you sent a gift and your request and it should be out soon. If you want to send another coin, I accept most coins and can let you know my public key if you choose to do so. Below are the main code gift wallets. Thank you for everyone whom have sent gifts. BITCOIN (BTC) wallet 33P5E2iwRLesW39sJoiQazoceQ8xQumHk2 LITECOIN gift wallet MViCEBj3cjdhdz5ebnCskLVVAjGtMB92kD 35hBtnMzxmdiH7hjpjibWyKU3vvMBh26v8 Both are the same address. I have never sent to the "M" address, but the one starting with "3" always works for me. DASH Xj2aLbEye2PqR3tPm8s7r8EZx19eHmZH1w ZEC t1Yeja9QvgBKwZLeC6XrXHue1zxEPrRVSoK
Views: 233 Money Charts
Be sure to drink your Ovaltine
 
02:47
Scene from A Christmas Story in which Ralphie gets his decoder ring -- and learns something about the world.
Views: 430290 Ed Morrissey
OSS Speaker Series presents Jeremy Allison
 
01:44:59
The Future of Samba
Views: 1704 Google
TransformHER Conference LiveStream
 
06:41:47
TransformHER is the premier conference presenting a forum for professional Black & Latina Women in technology to build stronger relationships & leverage resources to advance. The theme of the event focuses on Up-Leveling Self, Industry, and Society.
Views: 2824 LinkedIn