Grin Mainnet to be Laucnhed

Grin is an implementation of the MimbleWimble protocol of unknown creator
16 January 2019   789

On January 15, Grin, the main cryptocurrency network, was launched, which is based on the MimbleWimble protocol aimed at solving problems of scaling and privacy.

It is stated on GitHub that Grin is already supported by the decentralized Bisq exchange, the well-known mining pools of and F2Pool, as well as other companies and crypto services.

Grin is an implementation of the MimbleWimble protocol, the creator of which is still unknown. Within the framework of this blockchain, there is no concept of addresses and the requirements for free space for data storage are minimized. Also, this blockchain promises to be fast and decentralized.

In addition to the high degree of privacy and scalability, Grin is distinguished by the fact that the generation of new blocks in the network of this cryptocurrency occurs every minute. The cryptocurrency is based on the CWCOO Cycle hash algorithm, which is resistant to hacking with the help of quantum computing.

According to the developers, within two years after the launch of the main Grin network, hard forks will be held regularly, aimed at countering ASIC miners who are threatening the ideology of decentralization.

It is noteworthy that the launch of Grin was not preceded by ICO or Premin, the development was conducted on a voluntary basis.

Potentional Vulnerabilities Found in ETH 2.0

Least Authority have found potentional security issues in the network P2P interaction and block proposal system
26 March 2020   919

Technology security firm Least Authority, at the request of the Ethereum Foundation, conducted an audit of the Ethereum 2.0 specifications and identified several potential vulnerabilities at once.

Least Authority said that developers need to solve problems with vulnerabilities in the network layer of peer-to-peer (P2P) interaction, as well as in the block proposal system. At the same time, the auditor noted that the specifications are "very well thought out and competent."

However, at the moment there is no large ecosystem based on PoS and using sharding in the world, so it is impossible to accurately assess the prospects for system stability.
Also, information security experts emphasized that the specifications did not pay enough attention to the description of the P2P network level and the system of records about Ethereum nodes. Vulnerability risks are also observed in the block proposal system and the messaging system between nodes.

Experts said that in the blockchains running on PoS, the choice of a new block is simple and no one can predict who will get the new block. In PoS systems, it is the block proposal system that decides whose block will fall into the blockchain, and this leads to the risk of data leakage. To solve the problem, auditors suggested using the mechanism of "Single Secret Leader Election" (SSLE).

As for the peer-to-peer exchange system, there is a danger of spam. There is no centralized node in the system that would evaluate the actions of other nodes, so a “malicious" node can spam the entire network with various messages without any special punishment. The solution to this problem may be to use special protocols for exchanging messages between nodes.