Artwork

محتوای ارائه شده توسط Epicenter Media and Epicenter Media Ltd.. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Epicenter Media and Epicenter Media Ltd. یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Ari Juels: Authenticated Data Feeds and Criminal Smart Contracts

1:00:33
 
اشتراک گذاری
 

Manage episode 232838417 series 1652309
محتوای ارائه شده توسط Epicenter Media and Epicenter Media Ltd.. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Epicenter Media and Epicenter Media Ltd. یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Ari Juels, a Professor at Cornell Tech (Jacobs Institute) and former Chief Scientist of RSA, joins us to discuss his work two of his blockchain-related research topics: Authenticated Data Feeds for Smart Contracts and criminal smart contracts.

One of the shortcomings of decentralized smart contracts is their inability to retrieve information from the outside world. Smart contracts can’t make API calls to websites and data feeds, but rely on oracles to feed real-world information to the chain. This potentially requires a high trust in the oracle operators. Authenticated data feeds promise to solve the problem by relying on Intel’s novel SGX hardware.

We also talked about how criminals could use smart contracts to more efficiently conduct crimes such as incentivizing the theft of private keys or even soliciting real-world crimes such as murder.

Topics covered in this episode:

  • Ari’s background in cryptography and cryptocurrencies
  • The pain points with oracles as we describe them today
  • The idea behind Authenticated Data Feeds
  • The hardware and software architecture of the Authenticated Data Feed model and how hardware isolation works
  • How Authenticated Data Feeds could be used to create criminal smart contracts
  • The differents ways in which criminals could use Authenticated Data Feeds to release bounties for crimes such as private key theft or even murder
  • Countermeasures to fight criminal smart contracts
  • The Initiative For Cryptocurrencies & Contracts (IC3) and its raison d’être

Episode links:

This episode is hosted by Brian Fabian Crain and Sébastien Couture. Show notes and listening options: epicenter.tv/164

  continue reading

611 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 232838417 series 1652309
محتوای ارائه شده توسط Epicenter Media and Epicenter Media Ltd.. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Epicenter Media and Epicenter Media Ltd. یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Ari Juels, a Professor at Cornell Tech (Jacobs Institute) and former Chief Scientist of RSA, joins us to discuss his work two of his blockchain-related research topics: Authenticated Data Feeds for Smart Contracts and criminal smart contracts.

One of the shortcomings of decentralized smart contracts is their inability to retrieve information from the outside world. Smart contracts can’t make API calls to websites and data feeds, but rely on oracles to feed real-world information to the chain. This potentially requires a high trust in the oracle operators. Authenticated data feeds promise to solve the problem by relying on Intel’s novel SGX hardware.

We also talked about how criminals could use smart contracts to more efficiently conduct crimes such as incentivizing the theft of private keys or even soliciting real-world crimes such as murder.

Topics covered in this episode:

  • Ari’s background in cryptography and cryptocurrencies
  • The pain points with oracles as we describe them today
  • The idea behind Authenticated Data Feeds
  • The hardware and software architecture of the Authenticated Data Feed model and how hardware isolation works
  • How Authenticated Data Feeds could be used to create criminal smart contracts
  • The differents ways in which criminals could use Authenticated Data Feeds to release bounties for crimes such as private key theft or even murder
  • Countermeasures to fight criminal smart contracts
  • The Initiative For Cryptocurrencies & Contracts (IC3) and its raison d’être

Episode links:

This episode is hosted by Brian Fabian Crain and Sébastien Couture. Show notes and listening options: epicenter.tv/164

  continue reading

611 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش