Open in app
Home
Notifications
Lists
Stories

Write
Cédric Waldburger
Cédric Waldburger

Home

Nov 1, 2018

Swissnex SF | Cédric Waldburger

Swissnex SF invited me to talk about my life without a home and just 64 things. I talk about why living with less is making me happier than I’ve ever been before and how I went from owning many hundred things to just 64. Video Transcript: Tonight I am still in…

19 min read

Swissnex SF | Cédric Waldburger
Swissnex SF | Cédric Waldburger

Oct 16, 2018

DFINITY Scholarship Winners Fall 2018

DFINITY offers Scholarships to individual researchers or groups that work on topics that are related to DFINITY’s technology. I’ve talked to all three winners of the current scholarship program in the fall of 2018. …

6 min read

DFINITY Scholarship Winners Fall 2018
DFINITY Scholarship Winners Fall 2018

Oct 10, 2018

Intro to Proof Techniques: Proofs. Part 3 of 3

This is Part 3 of my conversation with Robert, who gives an overview of the steps to actually prove that the desired Chain Properties hold in the given model. Starting from protocol events and their relative timing, one can draw interim conclusions that finally allow to make the proofs. Video Transcript: …

4 min read

Intro to Proof Techniques: Proofs. Part 3 of 3
Intro to Proof Techniques: Proofs. Part 3 of 3

Oct 2, 2018

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

This is Part 2 of my conversation with Robert about the System Model and the Threat Model that are used for the proofs in the DFINITY Consensus Whitepaper. In particular, Robert explains the assumptions about network synchrony and Byzantine faults. Video Transcript: Robert: So let’s jump to the next important thing…

6 min read

Intro to Proof Techniques: Models & Assumptions. Part 2 of 3
Intro to Proof Techniques: Models & Assumptions. Part 2 of 3

Oct 2, 2018

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

This is Part 1 of my conversation with Robert, who explains on the whiteboard what provable properties a blockchain must have to provide a finalized total order on transactions. The 3 fundamental Chain Properties are called Chain Growth, Chain Consistency, and Chain Quality. Video Transcript: Welcome back to yet another episode…

10 min read

Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger
Intro to Proof Techniques: Blockchain Properties. Part 1 of 3 | Cédric Waldburger

Sep 27, 2018

14 Day Water-Only Fast

My video from Day 12 of 14-day water-only fast. Two weeks ago I decided to do another one of my much-loved experiments :) I was in Northern Italy with my EO Forum. I had recently heard that a friend of mine had been on a seven-day juice fast. …

3 min read

14 Day Water-Only Fast
14 Day Water-Only Fast

Sep 27, 2018

Arthur and Cédric on the “Inside DFINITY” Couch

Arthur and I sat down to have a pretty wide-ranging conversation about his upcoming trip to Asia, what makes good events and much more. Video Transcript: Arthur: The idea behind why I assembled this gear was because I’m about to go on quite an extensive trip. Cédric: Where are you headed…

8 min read

Arthur and Cédric on the “Inside DFINITY” Couch
Arthur and Cédric on the “Inside DFINITY” Couch

Sep 15, 2018

Attack Vectors: Large-Range Attacks. Part 3 of 3

This is Part 3 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. In a Long-Range Attack, the attacker buys old (unused) secret keys to overwrite history. …

6 min read

Attack Vectors: Large-Range Attacks. Part 3 of 3
Attack Vectors: Large-Range Attacks. Part 3 of 3

Sep 15, 2018

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

This is Part 2 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Nothing-at-Stake means that in Proof of Stake it is basically cost-free to mine blocks on multiple forks. …

4 min read

Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3
Attack Vectors: Nothing-at-Stake Problem. Part 2 of 3

Sep 14, 2018

Attack Vectors: Selfish Mining Attack. Part 1 of 3

This is Part 1 of my conversation with Robert about well-known attacks against blockchains and the types of defense taken by DFINITY. Selfish Mining involves creating a chain in secret and releasing it, which depends on the progress of the official chain. …

6 min read

Attack Vectors: Selfish Mining Attack. Part 1 of 3
Attack Vectors: Selfish Mining Attack. Part 1 of 3
Cédric Waldburger

Cédric Waldburger

Entrepreneur | Essentialist | Explorer

Following
  • Mission

    Mission

  • Francesca (Check) Warner

    Francesca (Check) Warner

  • Dropbox

    Dropbox

  • M.G. Siegler

    M.G. Siegler

  • DFINITY

    DFINITY

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable