Ljubljana to host 1st Viberate Hackathon

V-Hackathon with a prize pool of €20,000 is taking place on June 16 - 17 and will focus on a new mobile app design
29 May 2018   909

Viberate music service provides a live music ecosystem in one platform. Now, in order to develop a concept for a new mobile app, it will organize the V-Hackathon on June 16-17 at Viberate headquarters.

The assignment concerns the target group, app concept, wireframe design, business model and a draft market penetration strategy. Teams will be composed of 4-6 individuals with at least 1 person as a team leader, 1 - as a marketing specialist and 1 - as a designer.

App guidelines recommend at least 1 of Viberate's assets to be included, consumer-oriented, crypto should not be the focus and it's not mandatory to include VIB token in the app. The schedule for Day 1 is as follows:

08:00 - 09:00                             Registration & coffee break
09:00 - 09:30 Welcoming speech / Presentation of mentors and the jury / Clarification of rules
09:30 - 12:00 Hacking
12:00 - 13:00 Lunch
13:00 - 18:00 Hacking
18:00 - 19:00 Dinner
19:00 - 21:30 Hacking
21:30 - 22:30 Happy hour
23:00 Door closes

More details about the event can be found here. At the moment of publication, Viberate market parameters are as follows:

Average price 0.131646 USD
Market cap 22,299,051 USD
Volume (24H) 2,735,180 USD

Potentional Vulnerabilities Found in ETH 2.0

Least Authority have found potentional security issues in the network P2P interaction and block proposal system
26 March 2020   212

Technology security firm Least Authority, at the request of the Ethereum Foundation, conducted an audit of the Ethereum 2.0 specifications and identified several potential vulnerabilities at once.

Least Authority said that developers need to solve problems with vulnerabilities in the network layer of peer-to-peer (P2P) interaction, as well as in the block proposal system. At the same time, the auditor noted that the specifications are "very well thought out and competent."

However, at the moment there is no large ecosystem based on PoS and using sharding in the world, so it is impossible to accurately assess the prospects for system stability.
Also, information security experts emphasized that the specifications did not pay enough attention to the description of the P2P network level and the system of records about Ethereum nodes. Vulnerability risks are also observed in the block proposal system and the messaging system between nodes.

Experts said that in the blockchains running on PoS, the choice of a new block is simple and no one can predict who will get the new block. In PoS systems, it is the block proposal system that decides whose block will fall into the blockchain, and this leads to the risk of data leakage. To solve the problem, auditors suggested using the mechanism of "Single Secret Leader Election" (SSLE).

As for the peer-to-peer exchange system, there is a danger of spam. There is no centralized node in the system that would evaluate the actions of other nodes, so a “malicious" node can spam the entire network with various messages without any special punishment. The solution to this problem may be to use special protocols for exchanging messages between nodes.