►
Description
Berlin Ethereum Meetup 2019/01/24
A
Stewart
and
I'm
the
CTO
co-founder
of
quanta
prior
to
that
I,
a
computer
scientist
and
I-
guess:
I,
guess:
I'm
a
PhD
drop
that
I
don't
like
admitting
it,
but
it
seems
to
be
the
cool
thing
to
say:
I
noticed
that
Remco
from
0x1
profile
for
him
is
his
PhD
dropout
I,
prefer
that
you
know
think
I'm
going
to
go
back
and
finish
it,
but
quantity
I
got
too
busy
for
me.
So
last
April
I
became
a
PhD
drop
dead.
A
Of
Waterloo
working
with
Professor
Derrick
ray
side
using
graphics,
processors
for
accelerating
the
operations
of
something
called
a
Sat
solver,
it's
a
tool
used
and
formally
verifying
both
as
an
example.
There
are
many
applications,
but
one
employment
application
in
software
engineering
is
for
a
formal
verification
of
software.
Of
course,
the
word
formal,
applying
mathematics,
mathematical,
rigor,
verification,
meaning
checking
that
certain
property
schools
being
able
to
prove
it
to
do,
and
so
Richard
mom
myself.
A
A
C
A
Are
yawning
Thor's
knees,
I've
crossed
his
name,
so
I
will
probably
stumble
a
little
bit
through
these
because
I
don't
normally
present
them.
But
yawn
is
a
ball
chain
researcher
and
he
would
normally
be
doing
this.
So
there's
lots
of
motivation
for
caring
about
security,
I
think
most
people
already
know
about
that,
and.
A
B
B
C
C
C
A
Different
definitions
for
computer
security,
but
anyhow
my
background
is
in
more
informal
verification
and
parallel
computing.
Him
I
took
me
some
time
to
get
used
to
and
of
the
branding
of
quant
stamp
as
a
security
company
security
software
engineering
turns
over
in
security,
so
and
so,
and
then
there's
this
notion
of
continuous
security
so
baby
the
question
you
deploy,
though,
how
can
it
be
protected
against
new
attacks?
Maybe
you've
already
done
everything
you
could
possibly
do.
Your
code
is
absolutely
perfect
at
that
moment
in
time.
Something
changes
in
the
future.
A
I,
don't
know
the
EDM
changes
and
someone
discovers
that
they
can
now
do
a
new
reenter
to
exploit
things
like
I
could
have
it.
So
my
staff
is
interested
in
this
idea
of
continuous
security,
which
is
basically
internally.
We
call
it
monitoring,
basically
observing
a
smart
contract
while
it's
live
and
alerting
trading
alerts.
If
there's
behavior
some
examples
of
what
can
be
done
there
and
I'll
skip
through
that,
because
that's
not
really
I'm
going
to
talk
about
it.
Okay,.
D
A
Security
assurance
assurance
it
starts
with
an
A,
like
quality
assurance,
this
notion
of
somehow
being
able
to
assure
the
let's
say,
the
owner
or
the
stakeholder
of
a
smart
contract.
If
you
will
that
their
code
is
secure
and
won't
get
hacked,
and
so
we
have
these
these
two
actors
in
the
ashram
for
code,
one
is
the
stake
holder.
The
other
is
the
security
expert,
so
the
stake
holder
wants
their
code
to
be
correct.
If
something
bad
happens
to
make
these
funds
digital.
C
A
A
To
compensate
for
an
exploited
contract
and
we
have
a
security
expert
who
wants
to
audit
the
code
and
get
paid
for
so
these?
This
is
the
scenario
we
meet.
We
begin
with.
The
security
expert
is
so
confident
in
his
auditing
skills
that
he
says
you
know
what
I
wanted
to
stake.
Some
of
my
own
funds,
you
know,
put
my
reputation,
my
money
on
the
line
and
else
else
take
a
certain
amount
to
click
to
clean
that
the
contract
is
correct.
Now,
why
would
I?
Why
would
I
do
that?
Well
now,
and
why
was
something
so?
A
Expert,
but
anybody
in
the
world
they
could
just
say
yeah,
I,
guess
ten
security
experts
have
gone
in
and
said
this
contract
looks
good.
Maybe
I'll
come
in
well.
What
is
doing
you
need
we'll
see,
we'll
see
momentarily
but
I'm
talking
about
the
staking
of
funds
and
what
would
it
scent
advise
you
to
do
that?
Well,
the
stake
holder
pays
for
this,
so
it's
kind
of
like
like
a
premium.
A
C
A
So
I'm
a
stakeholder
I
said
and
I
say:
okay,
my
friends
or
somehow
my
contract
is
exploited
actually
more
generically,
whether
it's
fun
or
something
else
like
you
might
imagine.
Namely
there
is
some
policy
or
some
conditions
that
are
that
do
not
hold
and,
as
a
result,
I
want
to
clean
these
funds.
So
I
said
from
the.
A
These
are
these
funds
are
lost
if
the
contract
is
exploited
there.
Let
me
clarify
it's
so
the
security
expert
and
someone
else
they're
speaking
funds,
and
they
want
to
do
that
because
they're
getting
paid
by
the
stake
holder,
but
as
soon
as
something
bad
happens
to
the
stake
holders
contract
that
the
stake
holder.
E
A
A
There,
actually
it's
quite
complicated.
We
have
extremely
detailed
diagrams
on
our
internal
wiki
and
too
much
to
go
into
for
this
and
I.
Don't
know
what
that's
why
this
work,
and
so
obvious
question
is
well
what
is
an
exploit,
so
this
question
is
being
posed
because
we
want
to
know:
when
can
the
stakeholder
claim
to
have
suffered
damages
and
can
clean
what
was
state
so
so
as
it.
A
A
We
get
into
that
to
finding
exploits,
defines
the
conditions
I've
lately,
because
Paul
yeah,
we
call
this
policy
and
basically
the
says
so-
here's
a
for
example,
this
function.
This
is
obviously
a
trivial
example,
but
in
the
body
of
this
see
here
basically
it
says,
though,
if
the
balance
goes
to
zero.
That
indicates
this
is
this
has
been
hacked
I
think
you
can
probably
imagine
the
scenarios
where
you
know
balance.
A
A
This
is
you
know.
Alternatively,
you
could
consult
an
Oracle
to
verify
that
as
some
event
or
curve,
so
that
that's
been
identified
as
another
possibility.
I
like
the
idea
of
being
able
to
actually
define
the
policy
as
a
contract
as
a
smart
contract
and
that's
defined
up
front
and
then
the
security
experts
who
are
supposed
to
be
experts
and
reviewing
code.
They
can
read
the
policy
if
they're
comfortable
with
it,
then
they're
willing
to
state
their
own
funds.
Now
you
can
also
imagine
maybe
I'm
really
clever
and
I.
A
A
A
A
A
So
you'll
see
that
the
slide
is
titled,
spanking
and
I,
really
in
really,
which
probably
should
be
just
titled
assurance.
So
this
idea
of
security
assurance
arguably
enables
our
helps
to
scale
all
the
verification
business
to
discuss
that,
but
by
providing
a
marketplace
for
ours,
so
code
experts
and
others
to
state
collateral
as
a
claim
on
the
contract,
security
and
a
void
for
our
deal
in
reports.
So
since
checks
are
automatic
and
rational,
actives
won't
stay
on
and
secure
contracts
or
policies
which
can
be
gamed
by
stakeholders.
A
So
I,
actually
don't
remember,
always
referring
to
Europe
for
reports.
But
I
think
this
is
about
where
I'm
saying
I
got
earlier.
I
said
you
can
kind
of
game
this.
You
could
imagine
a
stakeholder,
you
can
gaming
it,
but
a
rational
actor
who
studies
the
totem
understands
that
they're
not
going
to
state
collateral.
If
they
know
there's
a
you
know
some
kind
of
backdoor
or
vulnerability
so.
A
A
smart
contract,
I
kind
of
compare
this
so
a
few
years
ago,
I
worked
at
a
startup
company
called
MACD
and
we
were
using
GPS
in
memory.
Gpu
databases
to
do
this
really
fast
millisecond,
clearing
of
gigabytes
of
data.
Actually
we
were
thinking,
maybe
I'd
better.
We
were
talking
to
big
fin
tech
companies,
I'm,
not
sure
if
I'm,
actually
the
it's
been
a
few
years,
they
probably
can
who
are
interested
in
fraud
detection.
A
A
That's
a
good
question:
I,
don't
think
so.
I
think
the
way
we've
designed
this
so
that
all
the
details
but
I'm
pretty
sure
the
way
that
there's
it's
designed
to
offer
greater
benefit
to
actual
security
experts
and
to
incentivize
them
to
participate.
There's
a
what's
called
a
TCR,
a
token
curated
registry
that
will
maintain
the
list
of
I
guess
an
accredited
security
experts,
but
I
don't
have
the.
A
D
A
There
are
periods,
so
actually
we
have
been
developing
an
user
interface.
I
forgot
I
still
have
needs
to
show
you
and
you'll
see
things
in
here.
I
realize
the
text
is
small
for
you,
but
so
this
is
defining
what
we
call
a
pool
so
in
the
stakeholder,
so
the
pool.
Of
course
this
refers
to
the
pool
of
state
funds
for
assuring
the
contract,
and
then
there
are
all
these
different
details
that
define
how
the
payment
works.
When.
A
Payment
period
is
all
these
different
things
in
it
expressed
in
terms
of
every
block,
so
there's
minimum
staging
time
yeah.
So
this
is
just
quite
a
bit
there.
So
this
this
is
supposed
to
be
the
stakeholders
view
and
then
there's
the
speaker
controls
as
well,
and
this
this
is
a
prototype
at
the
moment.
So,
if
you're
a
state,
there's
you
state
your
father's,
you
can
withdraw
and
there
you
see
actually
in
this
I
think
the
withdrawal
stink.
But
it
looks
like
to
me
it's
like
faded,
because
at
that
moment
they're
not
eligible
to
whisper
off.
D
A
A
He's
he's
currently
building
this
agent
reinforced
reinforcement,
learning
simulation
with
an
objective
function
to
maximize
the
end
balance
for
the
stators
and
we're
developing
that
right
now
and
we're
also
doing
a
community
quants
camp
community
involved
test
trial
of
our
current
prototype,
and
this
is
going
to
help
us
to
get
more
precise
answers
to
your
question.
Hope
that
makes
sense,
so
we're
still
very
much
so
very
much
a.
E
The
way
how
you
define
the
whether
there
was
an
exploit
or
not,
if
you
try
to
encode
this
in
smart
contract,
it
seems
like
it
will
be
very,
very
complex,
smart
contract
and
I'm,
not
even
sure
that
is
possible
to
to
check
whether
what
check
every
situation,
but
even
for
every
situation
you
can
sync
up.
You
will
create
this
mark
contract
that
will
verify,
and
it
seems
like
this
use
much
contract
which
will
verify
whether
there
was
exploit
or
not.
It
also
means
so.
This
is
like.
A
E
The
security
that's
good
you're
right,
but
as
the
owner
of
the
product
or
user
of
the
product,
if
you
actually
do
the
audit
for
the
users
of
the
product,
and
this
users
cannot
really
like
sure
that
this
product
is
safe
just
because
these
security
experts,
they
know
that
they
are
doing
what
what
they
want
so
executed.
Experts
are
safe
because
you
cannot
like
you,
cannot
find
exploit
that
we
were.
A
Experts
to
QuickTime
put
their
own
funds,
and
hopefully
get
paid
is,
is
a
way
to
create
greater
confidence,
swabbies
that
were
insurance,
greater
confidence
and
the
security
of
the
smart
contract.
I'm
not
saying
this
is
perfect
and
I.
Obviously
the
policy
could
be
very
complicate,
it
could
be,
it
could
be
as
simple
as
if
the
balance
goes
below
or
whatever.
A
Then
you
know
condition
that
could
be
that
simple
or
it
could
be
very
complicated,
that's
possible
as
well
and
I
agree.
We
would
probably
want
to
have
Nationals.
Are
the
policy
as
well,
because
maybe
you
have
a
nefarious
malicious
security
expert
who
sees
a
flawed
and
the
publicity
and
they
don't
tell
you
because
they
actually
want
to
explain
it.
Yeah,
yeah
yeah,
so.