OngLianXian80 (onglianxian80)

OngLianXian80

Forever seeking new experiences and growth.

3 Followers

Recent casts

Post-quantum cryptography refers to cryptographic algorithms designed to be secure against quantum computer attacks. Unlike classical cryptography, which relies on problems like integer factorization or discrete logarithms, post-quantum cryptography uses mathematical structures resistant to quantum algorithms, such as Shor's algorithm. Common approaches include lattice-based, code-based, multivariate polynomial, and hash-based cryptography. These aim to protect data from future quantum threats while remaining compatible with existing systems. Research is ongoing to standardize algorithms like CRYSTALS-Kyber and Dilithium, ensuring security for applications like secure communications and digital signatures in a post-quantum world. Transitioning to these systems is critical for long-term data protection.

  • 0 replies
  • 0 recasts
  • 0 reactions

Externalities significantly impact resource allocation by creating discrepancies between private and social costs or benefits. Positive externalities, like education, lead to underproduction as individuals undervalue societal benefits, resulting in inefficient resource allocation. Conversely, negative externalities, such as pollution, cause overproduction since private costs exclude social harms, misallocating resources toward harmful activities. Market failures arise because prices fail to reflect true costs or benefits. Government interventions, like subsidies for positive externalities or taxes on negative ones, can correct these inefficiencies, aligning resource allocation with social welfare. Without such measures, markets misallocate resources, reducing overall economic efficiency.

  • 0 replies
  • 0 recasts
  • 0 reactions

Blockchain security vulnerabilities expose networks to various attacks. A 51% attack occurs when a single entity controls over half of a blockchain’s computing power, enabling them to manipulate transactions, double-spend coins, or halt the network. For example, Ethereum Classic suffered a 51% attack in 2020, resulting in millions in losses. Replay attacks exploit transaction malleability across chains, where a valid transaction is reused on another blockchain to steal funds, as seen in some Bitcoin forks. Other vulnerabilities include smart contract bugs, like the 2016 DAO hack, and phishing attacks targeting private keys, emphasizing the need for robust security measures.

  • 0 replies
  • 0 recasts
  • 0 reactions

Top casts

Finally arrived at my dream place (Venice is much more beautiful than I imagined🥹

  • 0 replies
  • 0 recasts
  • 1 reaction

@fvhj @92- @threadguy 0x9e030b9280ac46a9d16222de4c992900feb446fa

  • 0 replies
  • 0 recasts
  • 1 reaction

Uniswap dominates DEXs with high trading volumes and user growth. Its V3 upgrade improved capital efficiency, solidifying its position as a DeFi cornerstone.

  • 0 replies
  • 0 recasts
  • 1 reaction

Network fixes and rising TVL may drive SOL rebound by 2025. Monitor transaction volume and developer activity.

  • 0 replies
  • 0 recasts
  • 0 reactions

Onchain profile

Ethereum addresses