Peer Mountain joins Enterprise Ethereum Alliance

Peer Mountain joined Enterprise Ethereum Alliance to solidify its position in the enterprise realm as the announcement came out on June 4
04 June 2018   1807

The world's largest open-source blockchain initiative Enterprise Ethereum Alliance (EEA) welcomes its new member Peer Mountain. An access to direct collaboration with industry leaders and a chance to enhance its solutions for enterprise became the reason of such move.

Peer Mountain will take part in cultivating and designing best practices, open standards and open-source reference architectures based on Ethereum blockchain.

Membership in the EEA will help boost development of our enterprise-ready cross-chain protocol that connects SSID holders with businesses, enabling scalable blockchain commerce. We look forward to contributing the the EEA's collective expertise. Working closely with our fellow alliance members, we hope to accelerate enterprise-level adoption of blockchain technology and enable our clients to deliver innovative solutions to their customers.

 

Jed Grant

CEO and Founder, Peer Mountain

Peer Mountain is the cross-blockchain protocol that connects self-sovereign ID holders with businesses, enabling commerce at scale. It provides instant cost-effective regulatory compliance, enables clients to take full control over the personal information and pays ID verifiers for the trustworthiness.

Potentional Vulnerabilities Found in ETH 2.0

Least Authority have found potentional security issues in the network P2P interaction and block proposal system
26 March 2020   964

Technology security firm Least Authority, at the request of the Ethereum Foundation, conducted an audit of the Ethereum 2.0 specifications and identified several potential vulnerabilities at once.

Least Authority said that developers need to solve problems with vulnerabilities in the network layer of peer-to-peer (P2P) interaction, as well as in the block proposal system. At the same time, the auditor noted that the specifications are "very well thought out and competent."

However, at the moment there is no large ecosystem based on PoS and using sharding in the world, so it is impossible to accurately assess the prospects for system stability.
Also, information security experts emphasized that the specifications did not pay enough attention to the description of the P2P network level and the system of records about Ethereum nodes. Vulnerability risks are also observed in the block proposal system and the messaging system between nodes.

Experts said that in the blockchains running on PoS, the choice of a new block is simple and no one can predict who will get the new block. In PoS systems, it is the block proposal system that decides whose block will fall into the blockchain, and this leads to the risk of data leakage. To solve the problem, auditors suggested using the mechanism of "Single Secret Leader Election" (SSLE).

As for the peer-to-peer exchange system, there is a danger of spam. There is no centralized node in the system that would evaluate the actions of other nodes, so a “malicious" node can spam the entire network with various messages without any special punishment. The solution to this problem may be to use special protocols for exchanging messages between nodes.