Security
Search documents
X @Starknet (BTCFi arc) 🥷
Starknet 🐺🐱· 2025-11-24 12:52
Starknet优势 - Starknet在链上运行的计算量方面具有独特性[1] - 三家顶级Perp DEXs正在与Starknet合作建设[1] - Starknet拥有最先进的完全链上游戏生态系统[1] Starknet特性 - Starknet提供真正的去中心化、安全性和隐私[1]
X @THE HUNTER ✴️
GEM HUNTER 💎· 2025-11-24 12:46
There is something different about @wardenprotocol🔸Every update feels like a reminder that real innovation is calm, precise, and focused on safety.🔸Warden keeps building the foundations that will support the next wave of Web3, from advanced security layers to permission systems that work across entire ecosystems.It is becoming the quiet powerhouse of this market. ⚡️Project that grows in value, not volume. 🔥🛡️ ...
X @CoinMarketCap
CoinMarketCap· 2025-11-24 12:00
Crypto Fundraising Overview - Last week's top crypto fundraising saw Kalshi, a prediction market platform, leading with $1 billion [1] - CEX (Centralized Exchange) Kraken secured $200 million in funding [1] - AI and security-focused Doppel raised $70 million [1] - Obex, an RWA (Real World Asset) incubator, obtained $37 million [1] Specific Project Funding - Deblock, a wallet provider, received $35 million in funding [1] - Numerai, focusing on AI and payments, raised $30 million [1] - Wizzwoods, an NFT and P2E (Play-to-Earn) game, secured $10 million [1] - RateX, a DEX (Decentralized Exchange) with leverage farming, raised $7 million [1] - HelloTrade, focusing on perpetuals and RWA, obtained $4.6 million [1] - 0xbow, a privacy-focused project, raised $3.5 million [1]
X @Starknet (BTCFi arc) 🥷
Starknet 🐺🐱· 2025-11-23 13:55
Bitcoin, Ethereum, and Zcash.Security, decentralization, and scale.Speed, privacy, and UX.Starknet is bringing it all together. ...
X @Starknet (BTCFi arc) 🥷
Starknet 🐺🐱· 2025-11-23 02:48
ZK Stack Overview - ZK Stack允许外部观察者验证计算的正确性,无需查看输出本身,只需知道公共输入和验证逻辑[1] - 所有在ZK领域构建的团队都在解决两个问题:验证任意业务逻辑的能力和证明时间[2] - 评估ZK Stack的稳健性还需关注中心化程度和可扩展性[3] Starknet's Advantages - Starknet在四个维度上显著领先:去中心化的证明者和验证者、通用业务逻辑处理、高交易处理能力和可接受的证明时间[4][7] - Starknet选择公开输出,以便继承以太坊的安全性[4] - Starknet能够处理通用业务逻辑,支持产品路线图,无需升级zk-circuits[6] Extendedapp's Benefits from ZK Stack - Extendedapp已经受益于ZK Stack,运行大规模计算,无需用户信任,同时产生小证明,降低成本[1][5] - Starknet每天可以处理数百万笔交易[7] - 目前的证明时间为6小时,预计明年将降至约1小时[7]
X @Bloomberg
Bloomberg· 2025-11-22 18:13
The FAA issued an advisory telling operators to take caution at all altitudes due to the “worsening security situation and heightened military activity around Venezuela.” https://t.co/iaT6vzI6Na ...
The New Age of Infiltration and the Collapse of Firewall-Based Security
Accessnewswire· 2025-11-21 18:20
Group 1 - The article emphasizes that nations are recognizing the dual nature of security, which includes both physical protection of borders and the institutional safeguarding of trust [1] - It highlights the growing importance of institutional security in maintaining public confidence and trust in governmental and financial systems [1] - The discussion suggests that addressing these two fronts is crucial for national stability and security in the modern world [1]
X @Nick Szabo
Nick Szabo· 2025-11-21 17:53
RT Nick Szabo (@NickSzabo4)Whether you try to discourage something, or do nothing, or try to encourage it -- or seem to do these things -- each of these actions or non-actions sends a signal, often a much more powerful signal than the actual security of your effort warrants.Think about locks on your door. Would they stop a skilled and determined robber? No. Do they stop most unwanted visitors? Yes. Most predators just want dinner, and they will choose the least risky prey they can find.Since this debate mos ...
X @Nick Szabo
Nick Szabo· 2025-11-21 05:39
Security Considerations - Discouraging, ignoring, or encouraging actions related to security all send signals, regardless of their actual effectiveness [1] - Physical security measures, like door locks, deter most opportunistic threats, even if they don't stop determined attackers [1] - The focus is often on "locked-door" security or traffic signs, rather than absolute security, especially in areas like mempool and relay policy [2] - The inability to stop all attackers shouldn't prevent efforts to mitigate common behaviors that could harm node operators or the network [2] Network Policy - Discussions around mempool and relay policy are more about guiding behavior than ensuring strong security [2] - Alternative methods, even if weak, can send a signal and deter unwanted behavior [2]