Open in app

Sign In

Write

Sign In

Cédric Waldburger
Cédric Waldburger

273 Followers

Home

About

Nov 1, 2018

Swissnex SF | Cédric Waldburger

Swissnex SF invited me to talk about my life without a home and just 64 things. I talk about why living with less is making me happier than I’ve ever been before and how I went from owning many hundred things to just 64. Video Transcript: Tonight I am still in…

19 min read

Swissnex SF | Cédric Waldburger
Swissnex SF | Cédric Waldburger

19 min read


Oct 16, 2018

DFINITY Scholarship Winners Fall 2018

DFINITY offers Scholarships to individual researchers or groups that work on topics that are related to DFINITY’s technology. I’ve talked to all three winners of the current scholarship program in the fall of 2018. …

6 min read

DFINITY Scholarship Winners Fall 2018
DFINITY Scholarship Winners Fall 2018

6 min read


Oct 10, 2018

Intro to Proof Techniques: Proofs. Part 3 of 3

This is Part 3 of my conversation with Robert, who gives an overview of the steps to actually prove that the desired Chain Properties hold in the given model. Starting from protocol events and their relative timing, one can draw interim conclusions that finally allow to make the proofs. Video Transcript: …

4 min read

Intro to Proof Techniques: Proofs. Part 3 of 3
Intro to Proof Techniques: Proofs. Part 3 of 3

4 min read


Oct 2, 2018

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

This is Part 2 of my conversation with Robert about the System Model and the Threat Model that are used for the proofs in the DFINITY Consensus Whitepaper. In particular, Robert explains the assumptions about network synchrony and Byzantine faults. Video Transcript: Robert: So let’s jump to the next important thing…

6 min read

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3
Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

6 min read


Oct 2, 2018

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

This is Part 1 of my conversation with Robert, who explains on the whiteboard what provable properties a blockchain must have to provide a finalized total order on transactions. The 3 fundamental Chain Properties are called Chain Growth, Chain Consistency, and Chain Quality. Video Transcript: Welcome back to yet another episode…

10 min read

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger
Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

10 min read


Sep 27, 2018

14 Day Water-Only Fast

My video from Day 12 of 14-day water-only fast. Two weeks ago I decided to do another one of my much-loved experiments :) I was in Northern Italy with my EO Forum. I had recently heard that a friend of mine had been on a seven-day juice fast. …

3 min read

14 Day Water-Only Fast
14 Day Water-Only Fast

3 min read


Sep 27, 2018

Arthur and Cédric on the “Inside DFINITY” Couch

Arthur and I sat down to have a pretty wide-ranging conversation about his upcoming trip to Asia, what makes good events and much more. Video Transcript: Arthur: The idea behind why I assembled this gear was because I’m about to go on quite an extensive trip. Cédric: Where are you headed…

8 min read

Arthur and Cédric on the “Inside DFINITY” Couch
Arthur and Cédric on the “Inside DFINITY” Couch

8 min read


Sep 15, 2018

Attack Vectors: Large-Range Attacks. Part 3 of 3

This is Part 3 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. In a Long-Range Attack, the attacker buys old (unused) secret keys to overwrite history. …

6 min read

Attack Vectors: Large-Range Attacks. Part 3 of 3
Attack Vectors: Large-Range Attacks. Part 3 of 3

6 min read


Sep 15, 2018

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

This is Part 2 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Nothing-at-Stake means that in Proof of Stake it is basically cost-free to mine blocks on multiple forks. …

4 min read

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3
Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

4 min read


Sep 14, 2018

Attack Vectors: Selfish Mining Attack. Part 1 of 3

This is Part 1 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Selfish Mining involves creating a chain in secret and releasing it, which depends on the progress of the official chain. …

6 min read

Attack Vectors: Selfish Mining Attack. Part 1 of 3
Attack Vectors: Selfish Mining Attack. Part 1 of 3

6 min read

Cédric Waldburger

Cédric Waldburger

273 Followers

Entrepreneur | Essentialist | Explorer

Following
  • Seb

    Seb

  • M.G. Siegler

    M.G. Siegler

  • DFINITY

    DFINITY

  • Bryan Johnson

    Bryan Johnson

  • Connor B. Milner

    Connor B. Milner

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech