Home page
Communities
Stats
About read.cash
Register
Login
Open register popup
read.cash
Topics
Life
Cryptocurrency
Blog
Writing
Experiences
Story
Blogging
Crypto
Bitcoin Cash
Thoughts
Blockchain
Money
BCH
Experience
Personal
Cryptocurrencies
read.cash
Bitcoin
Freewrite
Finance
Reality
Motivation
Love
Investment
Personal Thoughts
Journey
Family
Random
Travel
Food
...All topics...
Communities
Login
Get Started
For example:
disco
Attack
Relevant
Newest
All
Articles/Posts
Comments
Users
(comment)
MetaMask’s Latest Security Tool to Protect Smart Contracts from Attacks MetaMask, the leading software cryptocurrency wallet that enables users to interact with the Ethereum wallet on their browsers...
@Cryptobox
3 years ago
(comment)
A 6-month period of sending 12.5% (or potentially less) of the mining reward to fund development isn't inherently dangerous. The period is not relevant because the danger comes from the fact t...
@ZeusOnPills
4 years ago
(comment)
I agree with the sentiment of your comment, though I fail to see the 'danger' in this proposal. A 6-month period of sending 12.5% (or potentially less) of the mining reward to fund development isn't...
@SharkofMirkwood
4 years ago
(comment)
This shows the primary community split attack strategy now. First the anti-BCH forces split some important community members off. Now the attack-fork team pretends the obvious thing to do is for eve...
@Big-Bubbler
4 years ago
(comment)
despite a lot of interesting research, it still looks like we've not even defined the exact problem That's because there isn't one exact problem. There are many exact problems -- roughly a d...
@jtoomim
3 years ago
(comment)
Attack on Titan is a Japanese manga series written and illustrated by Hajime Isayama. It is set in a world where humanity lives within cities surrounded by enormous walls that protect them from giga...
@Sneha67
3 years ago
(comment)
Wrong! Only BCH holders and SHA256 miners can decide what is an attack and what is not. Increasing the 21MM limit (or introducing any other change) is not an attack if holders and miners want it....
@Roger_Murdock
4 years ago
(comment)
KIA Motors Ransomware Attach: Hackers Demand Up To $30M In Bitcoin The infamous DoppelPaymer gang has struck again, this time compromising sensitive data from the North American branch of the popula...
@Cryptobox
3 years ago
(comment)
life is a strategy game sometimes to defend and attack when you are attacked it is the beginning of your life in a tense atmosphere in the dark and your way is to anticipate that is to survive and c...
@pajeroz
2 years ago
(comment)
Unfortunately, there's a lot of bad information out there, and double-spend is a bit of a misnomer. If there was an actual double-spend where both transactions were confirmed on the same block (or...
@The00Dustin
3 years ago
(comment)
Hi there, I wanted to point out you made a couple of mistakes with regards to the FTL: First you write that it is a node-policy, this is incorrect. It actually is part of the consensus rules. This...
@TomZ
3 years ago
(comment)
Well, they have put out a new comment with some details now. That said, Not knowing and ASSUMING ABC will steal the money and keep it rather than use it to make BCH greater is what you and many regu...
@Big-Bubbler
3 years ago
(comment)
Great article dear you have written.... it's very interesting.. Heart of Darkness is a novella by Polish-English novelist Joseph Conrad about a narrated voyage up the Congo River into the Congo Free...
@Sneha67
3 years ago
(comment)
I don't know why the message that the true cost is really not borne by the miners, but by the holders isn't getting through to some people, you included. Sorry this got long, but, I will get t...
@Big-Bubbler
4 years ago
(comment)
If you mean the anti-BCH army of social engineering agents I call "trolls", they have a thousand different ways they attack BCH and promote the fake "Bitcoin" (BTC). BTC, like BSV is currently an at...
@Big-Bubbler
3 years ago
(comment)
In the case of Ransomware, undermining the motivation of the attackers. If they know they won't get paid for ransomware attacks, financially motivated aggressors will choose other methods of attack...
@M.Rosenquist
2 years ago
(comment)
1) Oscillations in difficulty. We do not want low variance in block time because of orphaning 2) By "low confirmation time" he meant we want the average confirmation time to be as close as possib...
@zawy
3 years ago
(comment)
Now I am also starting to think that the price has fallen because of a vampire attack, goes like this you short sell, go to spot exchanges and sell there, so you will win more btc as you dump BCH. v...
@francis105d1
3 years ago
(comment)
Thanks. I have been resisting the "troll army" attacks for a couple years here. If you do not believe in that ongoing attack, OK. If you do believe in it, I can only say I had my finger on the pul...
@Big-Bubbler
3 years ago
(comment)
I would get rid of downvotes. Its negative and as I said groups can attack using it. Certainly not inline with the principles of the platform. If people don't like something. Just don't upvote, tip....
@StarLord
4 years ago
(comment)
So I really liked this idea up front, but then I gave it some thought, and it seems to me like this system might still leave room for an attack. In fact, while I don't want to see more and more com...
@The00Dustin
3 years ago
(comment)
I appreciate your past support of BCH and think you are just mistaken in your theory that this funding is a bad idea. Your claim: "they plan to force all other miners, as well as all coinholders, to...
@Big-Bubbler
4 years ago
(comment)
Also, about the fighting. There are many more incoming attacks on Bitcoin Cash, than there are attacks originating from Bitcoin Cash. Most of the outgoing attacks are people angry at the waves of tr...
@Read.Cash
4 years ago
(comment)
Trumpet your own successes It's OK to let people know when you get a win, at least in small doses. That's not normally true with friends or spouses in daily life, because it sounds like bragging. Ye...
@lahlah
3 years ago
(comment)
Personal attacks are forbidden, you have agreed to that when signing up https://read.cash/@Read.Cash/what-is-readcash-7b0bfcfc#what-can-i-publish-on-readcash The post would have been fine otherw...
@Read.Cash
4 years ago
(comment)
Wow. Thanks for the summary of the after-fork attacks. So I suggested to Haipo Yang to list the trading of BCHN and BCHA futures and the one with higher price will get the ticker symbol “BCH”.....
@Big-Bubbler
3 years ago
(comment)
Some of these other options are: (3) Real-time targeting (RTT). Where wall clock time impacts what the difficulty accepted will be, and can be soft-forked into the protocol. If you want RTT,...
@jtoomim
3 years ago
(comment)
Why not both ways? Have a public face while others resort to silent attacks. Those that show that there is someone who is attacking and those that do attack aren't the ones in public who attack the...
@RowanSkie
3 years ago
(comment)
Seems like the author did not do any actual research: The spam attack True, there has been a spam attack, but the network didi't "screech to a halt". It merely got slower, meaning it took ma...
@factchecker
2 years ago
(comment)
In your last paragraph, the fact someone had tortured that person, is the crime as a whole, there is no point of investigating the various actions as separate actions, as the whole monolithic atta...
@ZeusOnPills
4 years ago
«
1
2
3
4
5
6
7
8
9
10
...
84
85
»