See Also
Proof of Elapsed Time (POET) Summary [Cryptocurrency consensus mechanisms]
In this poetically named consensus mechanism, network participants prove that they have slept for a random amount of time before being able to mint a block. POET was released by Intel in 2016 and was originally aimed at trusted computing using Intel CPU’s. A special instruction set called Software Guard Extensions (SGX) allows programs to […]
Proof of Location (PoL) Summary [Cryptocurrency consensus mechanisms]
In a Proof of Location consensus algorithm, users’ geospatial coordinates are accounted for as proof of value. This kind of algorithm is usually employed in cryptocurrency geomining systems. In a geomining application, users earn rewards for being at a certain place at a certain time. If, for example, a company wished to gather participants for […]
2012 Bitcoin and Altcoin Hacks [Part 4]
This article is part of our complete guide to Bitcoin and altcoin hacks. Here we cover Bitcoin and altcoin security incidents from the year 2012. Bitcoinica / Linode Hack Bitcoinica was hacked twice in 2012, which led them to shut down shortly after the 2nd heist. In March 2012 Bitcoinica reported that 18,547 BTC had […]
A program to send and handle every UNIX signal
While playing around with errno I decided to test what happens if I sent (and handled) every possible UNIX signal to a program. Running this as a non-root user, I figured I couldn’t break anything if I tried – so I went ahead and ran it. Let’s see: I skipped sending SIGKILL (9) for obvious […]