fastnet sunsetting dates are set
TL;DR
If you’re currently using fastnet
you must migrate to quicknet
by October 31st.
Applied cryptographer with a leaning for broader security/vulnerability research. Worked on the Distributed Randomness project, drand, at Protocol Labs and also on CBDC and SSI at SICPA, as well as broader cryptographic engineering at Kudelski Security. I've also been a Security Engineer on the Diem security team for Novi (Facebook/Meta). A subject matter expert in secure coding. As a consultant, I've supported customers by answering complex questions on security critical systems such as blockchain technologies, and by designing, evaluating and implementing complex cryptography such as key management systems or cryptographic primitives.
View all authorsIf you’re currently using fastnet
you must migrate to quicknet
by October 31st.
In this blog post, we’ll dive into creating a simple Notion widget that displays the latest public randomness from drand (for both the default
and quicknet
beacons from the League of Entropy network).
We are thrilled to announce the General Availability (GA) of our brand new quicknet
drand network running on the mainnet
nodes. This significant upgrade harnesses the capabilities of the new unchained randomness mode, enables timelock encryption in production, and delivers outputs at a much faster frequency of 3 seconds!
The network has now been running without issues for a month and a half since its launch on August 23rd, and we’ve seen our first early adopters start transitioning to it successfully.
Dear Friends & Colleagues,
TOPLINE: After four years of stewarding the drand project on behalf of LoE, Protocol Labs has decided to spin off our drand team into its own private enterprise, now called Randamu.
Last month, we have identified **a minor issue** in our implementation of the BLS signature on G1 used in the newly launched fastnet
network. This is an RFC compliance issue which led us to plan the launch of a new compliant quicknet
network and to spin down fastnet
.
The drand community and developer base is expanding rapidly. drand usage is gaining momentum with many applications using it to draw randomness for their systems. While our **slack workspace** is a great place to interact with other developers and the drand core maintainers, code walkthroughs are even better if one wants to gain a holistic view of the system, become familiar with nitty gritty details, and ask questions in real time.
drand is software for running a threshold network that generates publicly verifiable random numbers.
Boy, that's a mouthful.
We are happy to announce that our timed release encryption scheme "tlock" and its implementations, which we introduced in our previous blog post, have recently undergone a comprehensive security assessment by Kudelski Security. This was a crucial step in ensuring the robustness and reliability of our encryption system in order to guarantee that timelocked content remains encrypted until the time has come for it to be decrypted and never before.
On the 30th of March, the drand team hosted the second edition of the Randomness Summit alongside Real World Crypto in Tokyo, the first having been online only in 2020 during the COVID pandemic.