Aug. 11, 2022, 1:20 a.m. | Sarah Azouvi, Marko Vukolić

cs.CR updates on arXiv.org arxiv.org

Blockchain systems based on a reusable resource, such as proof-of-stake
(PoS), provide weaker security guarantees than those based on proof-of-work.
Specifically, they are vulnerable to long-range attacks, where an adversary can
corrupt prior participants in order to rewrite the full history of the chain.
To prevent this attack on a PoS chain, we propose a protocol that checkpoints
the state of the PoS chain to a proof-of-work blockchain such as Bitcoin. Our
checkpointing protocol hence does not rely on any …

attacks bitcoin blockchains pos

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Regional Leader, Cyber Crisis Communications

@ Google | United Kingdom

Regional Intelligence Manager, Compliance, Safety and Risk Management

@ Google | London, UK

Senior Analyst, Endpoint Security

@ Scotiabank | Toronto, ON, CA, M1K5L1

Software Engineer, Security/Privacy, Google Cloud

@ Google | Bengaluru, Karnataka, India

Senior Security Engineer

@ Coinbase | Remote - USA