Skip to content

Instantly share code, notes, and snippets.

View Dexaran's full-sized avatar

Dexaran Dexaran

View GitHub Profile
@Dexaran
Dexaran / ETC_multisig_wallet_audit_report.md
Last active July 24, 2023 15:54
Ethereum CLassic multisig wallet audit report.

Ethereum Classic Multisig Wallet audit report.

Summary

This is the report from a security audit performed on Ethereum Classic Multisig Wallet by Dexaran. This contracts are a version of OpenZeppelin Multisig Wallet.

The audit focused primarily on the security of funds and fault tolerance of the multisig wallet. The main intention of this multisig wallet is to serve as an official storage of funds donated for ETC development.

In scope

VaultSX hack: lessons learned and other thoughts

The main topics of the article are:

  • a brief overview of what happened to VaultSX
  • a process of negotiating with hackers
  • a few tips for how to act if you are a hacker
  • a number of concepts that could prevent such an accident in the future
  • a couple of tips for users to consider

ClarionOS FAQ

Since it makes no sense to answer the same questions in different channels multiple times - this section will contain the most frequently asked questions that I encountered.

Feel free to ask any unanswered questions in the comment thread.

1. What is Clarion?

Clarion is a communication tool. This tool is designed to enable users to communicate freely with each other without the involvement of third parties between them. This is necessary to prevent the possibility of censorship by these third parties.

Ultimate solution to 51% attacks: amend the Nakamoto consensus

TL;DR:

The Nakamoto consensus is a set of rules that is intended to define a trustless peer-to-peer electronical cash system that can solve a double-spending problem without financial institutions involvement. It fails to do so in some circumstances.

The main flaw of the Nakamoto consensus is that it assumes the possibility to rewrite the history of transactions in the past up to a potentially unlimited point of time, while in reality not all off-chain events can be reversed up to any point of time. The flaw is expressed in "The longest chain is always the right chain" paradigm which is the root of all 'stealth mining' attacks. The new paradigm "The longest chain is the right chain IF it does not suggests to reorganize more than X blocks of the already existing chain" must be applied in order to make these attacks impossible.

Another flaw of Nakamoto consensus is that it assumes that a node can trust itself. In reality on

ECIP Presentation Processes

Abstract

This aims at defining a standardized process for initial presentations relating to change proposals on the ETC network. With a well defined process for allowing presenters to present their ideas without disruption, we can garner more civil and productive discussions that allow all parties involved to participate once an understanding of the idea has been established.

This process only applies to initial presentations where someone with an idea can present their idea for general understanding and consumption. There is no voting or discussion making during these calls.

Motivation

Currently there is no clear process flow for how individuals or teams can present their ideas to the community. There is an overwhelming amount of "noise" in these discussions and it would be beneficial to all involved if there was a standardized process to allow voices to be heard from the person(s) with the idea.

Mediakit tables for Dynamic Gas Pricing.

{ "version": "eosio::abi/1.0", "types": [], "structs": [ { "name": "kkk", "base": "", "fields": [ { "name": "id",

< This is a template of the Callisto Treasury proposal >

Proposal name

(provide your proposal name that matches the name in contract, case sensetive)

Comparative Analysis and research

Problem that is solved by this project:

  • Prevents the burning of funds. Even unrevealed bids will not be completely lost now.

  • This also incentivises users to stay tuned with ECNS. You can just pick up 5% of the Deed value if someone has left his bid unrevealed.

  • Security improvements. ENS relies on block.timestamp, which is a potential security issue, since a miner can artificially affect the timestamp of a mined block. ECNS will rely on block number because the block number can not be directly affected by miners.