John Smith
Light Clients and Proof of Stake
Special thanks to Vlad Zamfir and Jae Kwon for many of the ideas described in this post
Aside from the primary debate around weak...
Superrationality and DAOs | Ethereum Foundation Blog
Warning: this post contains crazy ideas. Myself describing a crazy idea should NOT be construed as implying that (i) I am certain that...
The P + epsilon Attack
Special thanks to Andrew Miller for coming up with this attack, and to Zack Hess, Vlad Zamfir and Paul Sztorc for discussion and...
The Subjectivity / Exploitability Tradeoff
One of the issues inherent in many kinds of consensus architectures is that although they can be made to be robust against attackers...
Gav’s Ethereum ÐΞV Update V
I was woken by Vitalik's call at 5:55 this morning; pitch black outside, nighttime was still upon us. Nonetheless, it was time to...
The Ethereum Launch Process | Ethereum Foundation Blog
I’m Vinay Gupta, the newly minted release coordinator for Ethereum. I’ve been working with the comms team on strategy, and have now come aboard...
The Ethereum Development Process | Ethereum Foundation Blog
So I'm not sure if this kind of development methodology has ever been applied to such an extreme before so I figured I'd...
Getting to the Frontier | Ethereum Foundation Blog
So first some background. We’ve already covered a little about what to expect from Frontier in the Ethereum Launch Process blog post and Gav...
Mihai’s Ethereum Project Update. The First Year.
Into the ether
Hello, fellow Ethereans. I am Mihai Alisie, one of the Ethereum founders, and for the past year I’ve served as the...
Jutta’s update on bug bounty program and security audit
Hi, Jutta writing again – I initially introduced myself when we started the bounty program earlier this year and I’m happy to provide...