pull down to refresh

This week’s newsletter announces the Dark Skippy fast seed exfiltration attack, summarizes discussion about block withholding attacks and proposed solutions, shares statistics about compact block reconstruction, describes a replacement cycling attack against transactions with pay-to-anchor outputs, mentions a new BIP specifying threshold signing with FROST, and relays an announcement of an improvement to Eftrace that allows it to opportunistically verify zero-knowledge proofs using two proposed soft forks.