
| Quote: | “Armed with this information, criminals could steal user’s cryptocurrencies.” |
| Another Quote: | “The Lightning Network is the next generation of proposed solutions to the Bitcoin scalability problem” |
| [→] |
analytics for those Senior Software Developers, Team Leads, Architects, and Project Managers who're Able to Think
Developing secure software is a challenge. Writing really secure software is a real challenge.
Here are the articles which touch different security aspects of software, from “what cipher suites are not to be used with TLS”, to certain more or less novel things under ‘Security Research’ subcategory.
posted by Bitcoin Hare

| Quote: | “Armed with this information, criminals could steal user’s cryptocurrencies.” |
| Another Quote: | “The Lightning Network is the next generation of proposed solutions to the Bitcoin scalability problem” |
| [→] |
posted by Bitcoin Hare

| Quote: | “Security is often cited as the foremost advantage of choosing blockchain technology over centralized systems.” |
| Another Quote: | “There are recorded cases of hackers either compromising or taking advantage of loopholes in self- executing contracts on the blockchain” |
| [→] |
posted by "No Bugs" Hare

| Quote: | “Most of multi-million-dollar games have a special team dealing specifically with public and semi-private bots.” |
| Another Quote: | “it might help to ensure that whatever-information-you-collect, DOES NOT leave the player’s box” |
| [→] |
posted by "No Bugs" Hare

| Quote: | “there will be almost-zero information available via reading the stack frames.” |
| Another Quote: | “If your game is NOT really time-critical – we can go all the way to the full-scale Tor-like network out of obfuscation-only (Re)Actors” |
| [→] |
posted by "No Bugs" Hare

| Quote: | “Whenever we detect that the time spent within a piece-of-non-blocking-code, is more than a few seconds – then, either the system is hopelessly swapping, or we’re being debugged” |
| Another Quote: | “What if we send not just a challenge, but a “challenge which includes some piece of code to be executed on the Client-Side”?” |
| [→] |
posted by "No Bugs" Hare

| Quote: | “we can handle several Client versions (each with its own obfuscation) with the very same Server.” |
| Another Quote: | “Then, if/when a zero-day bug is encountered in TLS – our obfuscation does provide additional protection even before the attacker can reach the code with that zero-day vulnerability” |
| [→] |
posted by "No Bugs" Hare

| Quote: | “This is all what the-best-available-decompiler was able to do with our obfuscated code” |
| Another Quote: | “Performance-wise, we can do A LOT of obfuscation per network tick” |
| [→] |