Handshakes are silent, but hash rates on the HNS protocol just made some noise

栏目: IT技术 · 发布时间: 3年前

内容简介:The past month saw hash rates on the Handshake protocol more than 16x.July 13th, 2020 | A look into the Handshake Protocol and its recent run up in hashrates.Let’s not confuse Handshake with

Handshakes are silent, but hash rates on the HNS protocol just made some noise.

Jul 13 ·9min read

The past month saw hash rates on the Handshake protocol more than 16x.

July 13th, 2020 | A look into the Handshake Protocol and its recent run up in hashrates.

Handshakes are silent, but hash rates on the HNS protocol just made some noise

Elbow bumps replacing the handshake?

Introduction

Let’s not confuse Handshake with A handshake , which seems to be the antiquated physical way of politely grabbing another person’s hands in a firm-like grip, through quick up and down motions to signal a greeting or an agreement. In some instances, that handshake might be awkwardly prolongated, evoking images of Trump’s notorious handshakes which are well documented on many social media platforms. In the case of an SSL/TSL handshake, such an elongated exchange might prompt a failed connection leading to a 404. Or if a corrupted certificate is exchanged due to a Man-in-the-middle (MITM) attack, a host of other headaches would come along leading to a different view on what a handshake actually traditionally exchanges besides the supposedly innocuous agreement of acknowledgment (or in worst cases, COVID!!!).

In comes Handshake

For a project that has basically been “quiet” compared to other blockchain protocols working in a anonymous-like fashion, the Handshake protocol has crept up in an apace way the past month by seeing its mining hash rate 16x from around 25TH/S to now over 400TH/S. Falling in line with theoretical PoW mining economics, the price of HNS followed suit in the opposite direction starting from around $0.11 on June 7th hitting an ATL around $0.075 on June 28th, now recovering towards $0.0911.

Handshakes are silent, but hash rates on the HNS protocol just made some noise

(Figure 1) HNS price and hash rate showing an inverse relationship over the past month. Data pulled from Handshake block explorer ShakeScan.

It’s quite clear now how COVID has vehemently altered our lives in many aspects that has caused us to flip the script on a lot of things we’ve never questioned before. Without needing to get into too much detail of what we have experienced over the past 7 months, but the word dystopian could be understandably emblematic of what we have seen play out. The draconian social distancing and stay at home measures have basically placed us to be on the internet more so than we were before. This has inadvertently called for the need of more security and sovereignty in our internet lives as we have seen good actors try to spread important information fall into the hands of government censorship or bad actors trying to take advantage of our naïve internet time.

It was understood from the beginning of how the developers behind the Handshake protocol was going to join the blockchain movement in a concerted effort from the start. Ultimately with the goal of democratizing the way domain names are bought and sold, giving a new standardization around the Root Name Server, which is currently controlled by ICANN. Last year ICANN was egregiously caught attempting to sell the .Org top level domain (TLD) to a private equity firm for a whopping amount of money. A bit more on this later but this spun the question of how more centralized the internet has really become?

The digital TLS handshake

For a brief primer of what the Handshake team is trying to do, it’s best to quickly have an understanding of where the name comes from. No it does not come from our normal polite way of greeting people in person as introduced earlier, which we all now are staring to yearn more of, but rather the digital “handshake” our internet browsers make with backend servers to deliver you your daily “needed” non-essential social media content. It is basically a way for our computers to verify that the internet website we are about to connect to is secure and safe through a cryptographic process that takes milliseconds. Uday Hiwarale does a terrific job of breaking down common standard SSL/TLS handshakes in thisarticle if you want to understand deeper.

But for a brief illustration, it basically looks like a couple of back and forth request and receive messages from the client to the server illustrated in the below graphic as a waterfall like process.

Handshakes are silent, but hash rates on the HNS protocol just made some noise

(Figure 2) Graphic of the TLS 1.2 handshake taken from Wikimedia Commons. The newest upgrade is the TLS 1.3, which shortens the whole process even more.

The crux is when a client sends a request to the server, the server sends back a certificate, issued by a centralized trustworthy Certificate Authority (CA) and the public key to the client. This way the client can “trust” that the website is who they are supposed to be and then attaches a ‘pre-master secret’ back to the server encrypted with the public key given. But like with any centralized entity, attacks on these CAs have happened. What’s more alarming is how one CA provider actually has over a 50% market share of all CAs. And who’s to say that these centralized attacks can’t happen again?

Handshakes are silent, but hash rates on the HNS protocol just made some noise

(Figure 3) Not a 50% attack but an alarming market share % of the top CA listed.

For such an arcane territory of the internet, the Handshake protocol tries to alleviate this through their decentralized PoW blockchain network, allowing users to create and purchase their own top level domains with their private keys, such as .com, .net, .org, etc. via a Vickery Auction style. This is essentially trying to “eliminate” the needs for ICANN and CAs that are all too prone to centralized attacks and greedy egos that place money on top of security at times. To most people, these two acronyms, let alone this topic, is of an esoteric subject that really doesn’t affect them in their daily lives. But what we have seen with the advent of Bitcoin being spawned up at coincidentally, or purposely, during the same time of the last financial crisis, the same can be said with Handshake and recent events such as below:

1. In 2011, a Dutch certificate authority, known as DigiNotor, was quickly declared bankrupt after a security breach in their systems was found causing them to issue fraudulent certificates which then resulted in major web browsers to blacklist all DigiNotar certificates at the time.

2. In the same year, another certificate authority known as Comodo issued fraudulent certifications to users for many highly visited sites leading users to believe they were accessing these sites securely when in fact a MITM attack could’ve occurred.

3. And last but not least, the irony in ICANN being exposed for attempting to sell the rights of the more popular TLD, .Org, to a shady private equity firm set up by the former executive of ICANN. What’s more interesting about this news, which led to actual protests outside of ICANN’s offices, was the fact that this alleged sale was about to take place after the price cap of .Org domains was taken off earlier.

Handshakes are silent, but hash rates on the HNS protocol just made some noise
(Figure 4) What the Handshake protocol achieves is to do away with centralized CAs through the usage of compact certificates propagated on the network. Handshake would be where these CAs are stored with the owners of the domain names being the only ones that control it through the private keys.

以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

Scrum敏捷软件开发

Scrum敏捷软件开发

Mike Cohn / 廖靖斌、吕梁岳、陈争云、阳陆育 / 清华大学出版社 / 2010-11 / 69.00元

《Scrum敏捷软件开发》是敏捷联盟及Scrum联盟创始人之一、敏捷估算及计划的鼻祖Mike Cohn三大经典著作中影响最为深厚的扛鼎之作,也是全球敏捷社区中获得广泛肯定的企业敏捷转型权威参考。作者花四年时间,把自己近十五年的敏捷实践经验,特别是近四年中针对各种敏捷转型企业的咨询和指导工作,并结合旁征博引的方式,从更高的思想层次对敏捷与Scrum多年来的经验和教训进行深入而前面的梳理和总结,最终集......一起来看看 《Scrum敏捷软件开发》 这本书的介绍吧!

SHA 加密
SHA 加密

SHA 加密工具

UNIX 时间戳转换
UNIX 时间戳转换

UNIX 时间戳转换

RGB HSV 转换
RGB HSV 转换

RGB HSV 互转工具