We explore the space of trust-minimizing coordination mechanisms for on-chain vote buying and exploitation in the permissionless model.
In this Choose Your Own Adventure Game, you navigate the process of warning the world about an exploit you have uncovered in a large software project.
As deployed today, cryptocurrencies do not scale. To tackle this scaling problem, we introduce Pisa, which complements existing work on so-called "layer 2" solutions.
There are many online services that will help collect signatures for you, as well as services that will collect and forward legally binding letters. All of them are broken.
Suppose that N players share cryptocurrency using an M-of-N multisig scheme. If N-M+1 players disappear, the remaining ones have a problem: They've permanently lost their funds. In this blog, we propose a solution to this critical problem using the power of the trusted hardware.
Guest blogger Prof. Karen Levy describes how contracts often include terms that are unenforceable, purposefully vague, or never meant to be enforced, how this helps set expectations, and what this means for smart contracts.
We have been examining the state of the Bitcoin and Ethereum networks over time. In a recent study, we examine the level of decentralization in these two networks, with some interesting takeaways for the future.
Devising a lottery based off of a blockchain is a lot harder than it seems. Also, this is a parable for the Bitcoin blockchain debate.

Parity Proposals’ Potential Problems

This post argues that the recently proposed EIPs to rescue the frozen ethers are dangerous.
We discuss a novel scheme for preventing (miner) frontrunning in Ethereum.