InBenefactorybyBenefactoryDevCon 2: Imandra Contracts: Formal Verification for EthereumImandra formalizes the EVM inside an Ocaml-based formal verification language. This allows companies to prove which risks are present in…Nov 16, 2016
InBenefactorybyBenefactoryThe Future of Security in the Ethereum EcosystemThe biggest topic at September’s DevCon 2 was securing smart contract systems built on top of Ethereum. The core innovation of Ethereum is…Nov 16, 2016
Piper MerriamDevcon2 Token UpgradeI’ve spend the last few weeks hammering away at upgrading the Devcon2 Tokens. The original contract was written during the morning of the…Nov 17, 20162Nov 17, 20162
InBenefactorybyBenefactoryDevCon 2: Formal Verification for SolidityWriting code correctly is difficult. It’s hard to even define what correct is. Correct is when the program does what the programmer…Nov 16, 2016Nov 16, 2016
InThe Ether ReviewbyArthur FallsThe Ether Review #48 — Tracking A HackerIn Brief:The DAO hacker and Geth attacker have left a trail of evidence that can provide high quality identifying information about their…Nov 16, 2016Nov 16, 2016
InBenefactorybyBenefactoryDevCon 2: Imandra Contracts: Formal Verification for EthereumImandra formalizes the EVM inside an Ocaml-based formal verification language. This allows companies to prove which risks are present in…Nov 16, 2016
InBenefactorybyBenefactoryThe Future of Security in the Ethereum EcosystemThe biggest topic at September’s DevCon 2 was securing smart contract systems built on top of Ethereum. The core innovation of Ethereum is…Nov 16, 2016
Piper MerriamDevcon2 Token UpgradeI’ve spend the last few weeks hammering away at upgrading the Devcon2 Tokens. The original contract was written during the morning of the…Nov 17, 20162
InBenefactorybyBenefactoryDevCon 2: Formal Verification for SolidityWriting code correctly is difficult. It’s hard to even define what correct is. Correct is when the program does what the programmer…Nov 16, 2016
InThe Ether ReviewbyArthur FallsThe Ether Review #48 — Tracking A HackerIn Brief:The DAO hacker and Geth attacker have left a trail of evidence that can provide high quality identifying information about their…Nov 16, 2016
InBenefactorybyBenefactoryDevCon2: Smart Contract Security in EthereumEthereum launched with several smart contract languages, but the community has mostly converged on Solidity. Solidity’s dominance has been…Nov 16, 2016
InBenefactorybyBenefactoryDevCon2: Smart Contract Security Best PracticesFirst, developers need to prepare for failure. Developers and alpha users should also be ready for the “unknown unknowns.” Knowing all the…Nov 16, 2016
InBenefactorybyBenefactoryDevCon2: Smart Contract SecurityPhil Daian from IC3 opened up the talks on security at DevCon 2 hosted in Shanghai, China. Ethereum has higher potential for attacks…Nov 16, 2016