Seminar on what are digital assets and how their network security is maintained.
Preliminary podcast or discussion for Ethereum ETH 2.0 Casper and Beacon chain paper
https://arxiv.org/abs/1710.09437 (The technical discussion figures are from this paper)
Timeline :
0:00 Introduction, Utility Coins
1:29 Asset backed coins, Tether
4:37 Types of consensus Protocols : Proof of work (POW) and Proof of stake (POS)
14:40 Privacy, Fungibility
15:06 Examples of POS and POW coins in the market
Steve Rich's Exciting New Book: A Journey into the World of Forex Trading!
Interview17:25 Previous implementation of POW on ETH chain
22:50 POS implementation
24:38 POS attacks – Nothing at stake attack
27:39 Selfish Mining attack
31:26 Casper
35:03 PBFT Practical Byzantine Fault Tolerance
37:03 Sybil attack
37:23 Block height, Checkpoints root,b1,b2,b3 and corresponding Checkpoint Tree
38:55 Justified and Finalized blocks in POS
39:34 Voting
40:16 Slashing POS Deposit incase of penalty criteria
41:15 Accountable safety and Liveliness
43:05 Dynamic set of validators
43:37 Attacking the network/main chain
43:49 Long Range attack
44:26 Inactivity Leak attack
45:06 Careers in Blockchain Tech