Oct. 14, 2022, 1:20 a.m. | Sarah Azouvi, Marko Vukolić

cs.CR updates on arXiv.org arxiv.org

Blockchain systems based on a reusable resource, such as proof-of-stake
(PoS), provide weaker security guarantees than those based on proof-of-work.
Specifically, they are vulnerable to long-range attacks, where an adversary can
corrupt prior participants in order to rewrite the full history of the chain.
To prevent this attack on a PoS chain, we propose a protocol that checkpoints
the state of the PoS chain to a proof-of-work blockchain such as Bitcoin. Our
checkpointing protocol hence does not rely on any …

attacks bitcoin blockchains pos pow taproot

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA