• staff@nonsensus.io
BLOG: How Compiler Risk Exposes Gaps in Adversarial Thinking Among Today’s Crypto Founders – CryptoAnalyst

BLOG: How Compiler Risk Exposes Gaps in Adversarial Thinking Among Today’s Crypto Founders – CryptoAnalyst

In his Turing Award Lecture Reflections on Trusting Trust in 1984, Ken Thompson explained, for the first time, an attack vector against open source code that allowed introducing perfectly undetectable backdoors by compromising compilers. The attack vector can be explained in simple terms for the layman to understand it, which I will do in a moment. What makes it of particular interest, however, is that today there is widespread ignorance of its nature among the founders/creators of cryptocurrencies that aim to be decentralized and private. As delicately and non-offensively as possible, we’ve got to ask ourselves an important question. Can the minds of those who do not understand a well-documented attack vector like compiler risk, design a censorship resistant and private crypto economic system? That’s a question every reader must, after careful reading, decide for themselves.

BLOG: Understanding FHE Grade Private Smart Contracts: What They Are (Dero) and What They Are Not (Eth L2s) – CryptoAnalyst

BLOG: Understanding FHE Grade Private Smart Contracts: What They Are (Dero) and What They Are Not (Eth L2s) – CryptoAnalyst

Private smart contracts are one of those poorly defined things that some are rushing to turn into a buzzword before most people learn what the term actually means. As with everything else, the best way to understand something vague is to look at practical examples. In the case of smart contracts, the 2 extremes on the opposite sides of the privacy spectrum are Ethereum and Dero.

BLOG: The Global Personal Data Crisis – Azylem

BLOG: The Global Personal Data Crisis – Azylem

The constant drone of online presence has led to near limitless exposure of our personal data. The rise of social media, digital identity, online transactions, and the proliferation of Internet of Things (IoT) devices all scatters our personal data like a relentless flood, across myriads of platforms and thus custodians. On one hand, this trend allows the world to enjoy unprecedented connectivity and convenience. On the other, it leaves us all vulnerable to an incomprehensibly wide spectrum of privacy intrusions, data exploits and social engineering.

BLOG: Engram Wallet Beta – TheOA

BLOG: Engram Wallet Beta – TheOA

On December 24, 2023 the official Engram wallet Beta 0.5.0 was released, with major upgrades from the Alpha release, from Gnomon support to UI tweaks. Let’s have a look at this wallet and see if we can explain why it is so unique in how it empowers the autonomy of private individuals using $DERO unlike any other blockchain.