Tron and Zencash are Now accepted at Pornhub

The world’s largest adult entertainment websites Pornhub, now accepts cryptocurrency Tron as payment: this is significant for the newly independent Tron
27 June 2018   2348

Tron was ran on the Ethereum blockchain in April 2017 but soon declared itself as a competitor to its progenitor. It then migrated to a Beta version of its own blockchain at the end of May. Tron`s value has been steadily falling since its migration.

TRON

TRON charts

Pornhub introduces major new marketplace for Tron. Working since 2007, the site issued its 2017 ‘year in review’ in January and the numbers are staggering. 81 million visits a day (or 28.5 billion a year), 25 billion searches performed (that’s 800 per second), 68 years worth of porn uploaded, and 3,732 petabytes of data transferred - “every 5 minutes Pornhub transmits more data than the entire contents of the New York Public library’s 50 million books.”

Decentralized payment systems have continued to grow in popularity, and cryptocurrency adoption is exploding across a broad economic spectrum. Today, cryptocurrencies are especially viable in the adult entertainment industry because they are privacy-centric and incorporate more anonymity tools than traditional tender.
Corey Price
Pornhub VP

Another digital currency now accepted by Pornhub is Zencash, that is a fork of Zcash. Like it Zcash, Zencash is an anonymity-focused coin. Both they are similar but Zencash has additional features such as encrypted messaging and secure nodes - a small number of blockchain nodes that protect the blockchain from attacks, motivated to do so with a reward system similar to proof-of-stake. It has a market cap of $67 million (Zcash is at $682 million).

Pornhub was acquired by MindGeek in 2010. MindGeek is a Canadian pornography group that has been aggressive in its acquisitions over the last decade, according to Forbes, and now owns 8 of the 10 largest pornography websites. Tron has been making huge steps since its migration. It purchased software firm BitTorrent at the beginning of June for an amount which stays undisclosed but is reckoned to be well over $100 million. Some found this puzzling because BitTorrent is a file sharing website that is completely open source.

Tron Price at the Moment of Press: $0,039690 
Market Cap: $2 609 542 551
Volume (24h): $109 684 000 

Potentional Vulnerabilities Found in ETH 2.0

Least Authority have found potentional security issues in the network P2P interaction and block proposal system
26 March 2020   965

Technology security firm Least Authority, at the request of the Ethereum Foundation, conducted an audit of the Ethereum 2.0 specifications and identified several potential vulnerabilities at once.

Least Authority said that developers need to solve problems with vulnerabilities in the network layer of peer-to-peer (P2P) interaction, as well as in the block proposal system. At the same time, the auditor noted that the specifications are "very well thought out and competent."

However, at the moment there is no large ecosystem based on PoS and using sharding in the world, so it is impossible to accurately assess the prospects for system stability.
Also, information security experts emphasized that the specifications did not pay enough attention to the description of the P2P network level and the system of records about Ethereum nodes. Vulnerability risks are also observed in the block proposal system and the messaging system between nodes.

Experts said that in the blockchains running on PoS, the choice of a new block is simple and no one can predict who will get the new block. In PoS systems, it is the block proposal system that decides whose block will fall into the blockchain, and this leads to the risk of data leakage. To solve the problem, auditors suggested using the mechanism of "Single Secret Leader Election" (SSLE).

As for the peer-to-peer exchange system, there is a danger of spam. There is no centralized node in the system that would evaluate the actions of other nodes, so a “malicious" node can spam the entire network with various messages without any special punishment. The solution to this problem may be to use special protocols for exchanging messages between nodes.