1943 Uprising at Treblinka Concentration Camp (crematorium destroyed)
1944 Jewish survivors of Kovono Ghetto emerge from their bunker
1944 Turkey breaks diplomatic relationship with nazi-Germany
1945 After 3½ days suffering exhaustion, lack of water and shark attacks in the Philippine Sea, the surviving crew of USS Indianapolis are spotted by Wilbur “Chuck” Gwinn, a PV-1 Ventura pilot on a routine sector search. 316 had survived.
1945 Potsdam Conference between Joseph Stalin, Harry Truman and Winston Churchill ends
1948 Fanny Blankers-Koen of the Netherlands wins the 100m in 11.9 at the London Olympics; 1st of unprecedented 3 individual track & field gold medals
1948 Danish swimmer Greta Anderson (1:06.3) touches out American Ann Curtis by 0.2 in the women's 100m freestyle at the London Olympics
1948 Italians Adolfo Consolini and Giuseppe Tosi go 1-2 in the men's discus final at the London Olympics
1952 17 year-old future world champion Floyd Patterson wins the gold medal in the middleweight division at the Helsinki Olympic Games with a 1st round KO of Romanian Vasile Tita
1953 Betty Jack Davis, singer (w/Skeeter Davis), killed in car crash
1953 KCPQ TV channel 13 in Tacoma-Seattle, WA (IND) begins broadcasting
1967 The second Blackwall Tunnel opens in Greenwich, London
1967 "In the Heat of the Night" directed by Norman Jewison, based on John Ball's novel of the same name, starring Sidney Poitier and Rod Steiger premieres in New York (Academy Awards Best Picture 1968)
1968 35th Chicago College All-Star Game: Green Bay 34, All-Stars 17, 69,917 at Soldier Field
1968 Ron Hansen (Washington) & Tim Cullen (Chicago WS) become the first MLB players to be traded for each other twice in the same season, they had been traded in February in opposite directions
1969Bob Dylan makes surprise appearance at Hibbing HS Minn 10th reunion
Abstract We make several contributions that quantify the real-time hash rate and therefore the consensus of a blockchain. We show that by using only the hash value of blocks, we can estimate and measure the hash rate of all miners or individual miners, with quanti able accuracy. We apply our techniques to the Ethereum and Bitcoin blockchains; our solution applies to any proof-of-work-based blockchain that relies on a numeric target for the validation of blocks. We also show that if miners regularly broadcast status reports of their partial proof-of- work, the hash rate estimates are signi cantly more accurate at a cost of slightly higher bandwidth. Whether using only the blockchain, or the additional information in status reports, merchants can use our techniques to quantify in real-time the threat of double-spend attacks. References  2015. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. https://lightning.network/lightning-network-paper.pdf. (July 2015).  2016. Gnosis. https://www.gnosis.pm. (November 2016).  Asaph Azaria, Ariel Ekblaw, Thiago Vieira, and Andrew Lippman. 2016. "MedRec: Using Blockchain for Medical Data Access and Permission Management. In Proc. Intl. Conf. on Open and Big Data. 25–30.  Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. 2014. Enabling Blockchain Innovations with Pegged Sidechains. Technical report. (Oct 22 2014).  Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun. 2012. Bitter to better—how to make bitcoin a better currency. In International Conference on Financial Cryptography and Data Security. Springer, 399–414.  Bryan Bishop. 2015. bitcoin-dev mailling list: Weak block thoughts... https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-Septembe011158.html. (Sep 2015).  bitcoin 2015. Confirmation. https://en.bitcoin.it/wiki/Confirmation. (February 2015).  Joseph Bonneau. 2015. How long does it take for a Bitcoin transaction to be confirmed? https://coincenter.org/2015/11/what-does-it-meanfor-a-bitcoin-transaction-to-be-confirmed/. (November 2015).  J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, and E.W. Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In IEEE S&P. 104–121. http://doi.org/10.1109/ SP.2015.14  George Casella and Roger L. Berger. 2002. Statistical inference. Brooks Cole, Pacific Grove, CA. http://opac.inria.frecord=b1134456  Kyle Croman et al. 2016. On Scaling Decentralized Blockchains . In Workshop on Bitcoin and Blockchain Research.  Digix. 2017. https://www.dgx.io/. (Last retrieved June 2017).  DigixDAO. 2017. https://www.dgx.io/dgd/. (Last retrieved June 2017).  J. Douceur. 2002. The Sybil Attack. In Proc. Intl Wkshp on Peer-to-Peer Systems (IPTPS).  Bradley Efron. 1982. The jackknife, the bootstrap and other resampling plans. Society for industrial and applied mathematics (SIAM).  Ethash. 2017. https://github.com/ethereum/wiki/wiki/Ethash. (Last retrieved June 2017).  ethereum. Ethereum Homestead Documentation. http://ethdocs.org/en/latest/. (????).  Etheria. 2017. http://etheria.world. (Last retrieved June 2017).  Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. Financial Cryptography (2014), 436–454. http://doi.org/10.1007/978-3-662-45472-5_28  William Feller. 1968. An Introduction to Probability Theory and its Applications: Volume I. Vol. 3. John Wiley & Sons London-New YorkSydney-Toronto.  Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 281–310.  Arthur Gervais, Ghassan O. Karame, Karl Wust, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. https://eprint.iacr.org/2016/555. (2016).  Hashcash. 2017. https://en.bitcoin.it/wiki/Hashcash. (Last retrieved June 2017).  Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, and Sharon Goldberg. 2017. TumbleBit: An untrusted Bitcoincompatible anonymous payment hub. In Proc. ISOC Network and Distributed System Security Symposium (NDSS).  Svante Janson. 2014. Tail Bounds for Sums of Geometric and Exponential Variable. Technical Report. Uppsala University.  Litecoin. 2017. https://litecoin.org. (Last retrieved June 2017).  Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf. (May 2009).  A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, and Brian Neil Levine. 2016. A Secure, Efficient, and Transparent Network Architecture for Bitcoin. Technical Report UM-CS-2016-006. University of Massachusetts, Amherst, MA. https://web.cs.umass.edu/publication/details.php?id=2417  Meni Rosenfeld. 2012. Analysis of hashrate-based double-spending. https://bitcoil.co.il/Doublespend.pdf. (December 2012).  Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2015. Optimal Selfish Mining Strategies in Bitcoin. https://arxiv.org/pdf/1507.06183.pdf. (July 2015).  Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In IEEE S&P. 459–474. http://dx.doi.org/10.1109/SP.2014.36  Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in Bitcoin. Financial Cryptography and Data Security (2015). http://doi.org/10.1007/978-3-662-47854-7_32  Yonatan Sompolinsky and Aviv Zohar. 2016. Bitcoin’s Security Model Revisited. https://arxiv.org/abs/1605.09193. (May 2016).  F. Tschorsch and B. Scheuermann. 2016. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. IEEE Communications Surveys Tutorials PP, 99 (2016), 1–1. https://doi.org/10.1109/COMST. 2016.2535718  Marko Vukolić. 2015. The quest for scalable blockchain fabric: Proof-ofwork vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112–125.
Abstract In this position paper, we initiate a systematic treatment of reaching consensus in a permissionless network. We prove several simple but hopefully insightful lower bounds that demonstrate exactly why reaching consensus in a permissionless setting is fundamentally more difficult than the classical, permissioned setting. We then present a simplified proof of Nakamoto's blockchain which we recommend for pedagogical purposes. Finally, we survey recent results including how to avoid well-known painpoints in permissionless consensus, and how to apply core ideas behind blockchains to solve consensus in the classical, permissioned setting and meanwhile achieve new properties that are not attained by classical approaches. References  http://www.btproof.site/.  Lightning network. https://lightning.network/.  Marcin Andrychowicz and Stefan Dziembowski. Pow-based distributed cryptography with no trusted setup. In CRYPTO, pages 379–399, 2015.  Hagit Attiya, Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Bounds on the time to reach agreement in the presence of timing uncertainty. J. ACM, 41(1):122–152, 1994.  Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun. Bitter to betterhow to make bitcoin a better currency. In Financial cryptography and data security, pages 399–414. Springer, 2012.  Iddo Bentov and Ranjit Kumaresan. How to Use Bitcoin to Design Fair Protocols. In CRYPTO, 2014.  Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance. In OSDI, 1999.  T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, and Elaine Shi. Blockchain with varying number of players. Manuscript, 2017.  Jing Chen and Silvio Micali. Algorand: The efficient and democratic ledger. https://arxiv.org/abs/1607.01341, 2016.  Sophia Yakoubov Conner Fromknecht, Dragos Velicanu. A decentralized public key infrastructure with identity retention. Cryptology ePrint Archive, Report 2014/803, 2014. http://eprint.iacr.org/2014/803.  Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gun Sirer, Dawn Song, and Roger Wattenhofer. On scaling decentralized blockchains (a position paper). In Bitcoin Workshop, 2016.  Phil Daian, Rafael Pass, and Elaine Shi. Snow white: Robustly reconfigurable consensus and applications to provably secure proofs of stake. Cryptology ePrint Archive, Report 2016/919, 2016.  Danny Dolev and H. Raymond Strong. Authenticated algorithms for byzantine agreement. Siam Journal on Computing - SIAMCOMP, 12(4):656–666, 1983.  Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Consensus in the presence of partial synchrony. J. ACM, 1988.  Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In CRYPTO, 1992.  Ittay Eyal and Emin Gun Sirer. Majority is not enough: Bitcoin mining is vulnerable. In FC, 2014.  Michael J. Fischer, Nancy A. Lynch, and Michael Merritt. Easy impossibility proofs for distributed consensus problems. In PODC, 1985.  Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol with chains of variable difficulty. Cryptology ePrint Archive, 2016/1048.  Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. In Eurocrypt, 2015.  Jonathan Katz, Andrew Miller, and Elaine Shi. Pseudonymous secure computation from timelock puzzles. IACR Cryptology ePrint Archive, 2014:857, 2014.  Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Crypto, 2017.  Leslie Lamport. The weak byzantine generals problem. J. ACM, 30(3):668–676, 1983.  Leslie Lamport. Fast paxos. Distributed Computing, 19(2):79–103, 2006.  Litecoin - Open source P2P digital currency. http://litecoin.org/.  Andreas Loibl. Namecoin. namecoin.info, 2014.  Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.  Rafael Pass and abhi shelat. Micropayments for peer-to-peer currencies. In ACM CCS, 2015.  Rafael Pass, Lior Seeman, and Abhi Shelat. Analysis of the blockchain protocol in asynchronous networks. In Eurocrypt, 2017.  Rafael Pass and Elaine Shi. Fruitchains: A fair blockchain. In PODC, 2017.  Rafael Pass and Elaine Shi. Hybrid consensus: Efficient consensus in the permissionless model. In DISC, 2017.  Rafael Pass and Elaine Shi. The sleepy model of consensus. In Asiacrypt, 2017.  Rafael Pass and Elaine Shi. Thunderella: Blockchains with optimistic instant confirmation. In Eurocrypt, 2018.  Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A scalable content-addressable network. SIGCOMM Comput. Commun. Rev., 31(4):161–172, August 2001.  Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware, pages 329–350, 2001.  Yonatan Sompolinsky and Aviv Zohar. Secure high-rate transaction processing in bitcoin. In Financial Cryptography, 2015.  Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In SIGCOMM, 2001.  Gavin Wood. Ethereum: A secure decentralized transaction ledger. http://gavwood.com/paper.pdf, 2014.
Bitter to Better — How to Make Bitcoin a Better Currency Simon Barber 1, Xavier Boyen , Elaine Shi 2?, and Ersin Uzun 1 Palo Alto Research Center 2 University of California, Berkeley Abstract. Bitcoin is a distributed digital currency which has attracted a substan- tial number of users. We perform an in-depth investigation to understand what made Bitcoin so successful, while decades of ... Bitter to Better : How to Make Bitcoin a Better Currency. By Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun. In Financial Cryptography (FC 2012), volume 7397 of Lecture Notes in Computer Science, pages 399-414. Springer, 2012. Abstract. Bitcoin is a distributed digital currency which has attracted a substantial number of users. We perform an in-depth investigation to understand what ... View Simon Barber’s profile on LinkedIn, the world's largest professional community. Simon has 13 jobs listed on their profile. See the complete profile on LinkedIn and discover Simon’s ... Bitter to Better — How to Make Bitcoin a Better Currency Simon Barber 1, Xavier Boyen , Elaine Shi 2, and Ersin Uzun 1 Palo Alto Research Center 2 University of California, Berkeley Abstract. Bitcoin is a distributed digital currency which has attracted a substan-tial number of users. We perform an in-depth investigation to understand what made Bitcoin so successful, while decades of ... Simon Barber Founder @devicescape, advisor @ozmo-devices. Technical editor of 802.11. Researcher @xerox-parc. Highly creative and innovative multidisciplinarian. Software Engineer Silicon Valley University of Cambridge. 71 Connections There was a problem loading your content. Log in or sign up to find connections to Simon. Experience Ozmo Devices. Advisor. Devicescape. Founder, CTO 2001 - 2008 ...
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. 12 Year Old Boy Humiliates Simon Cowell ... Barber belittled by CNN's Brooke Baldwin returns to 'Tucker Carlson Tonight' - Duration: 6:47. Fox News Recommended for you. New; 6:47. Life Is Good ... This crazy footage of what appears to be a meteor over south San Antonio today at 2:02AM. Hej!går live nu. This video is unavailable. Watch Queue Queue http://calvinayre.com - Oron Barber & Eilon Arad of BetcoinTech talks about Bitcoin, the technology behind it and how it can change and influence the payment...