
ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

Subscribe to Ervin Zubic

Subscribe to Ervin Zubic
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers


Understand the building blocks, categories, and vulnerabilities of DeFi. This article summarizes expert research for investors, enthusiasts, and regulators.
This article is also published on my Medium page.
In their scholarly article “SoK: Decentralized Finance (DeFi) — Fundamentals, Taxonomy and Risks,” authors Krzysztof Gogol, Christian Killer, Malte Schlosser, Thomas Bocek, Burkhard Stiller, and Claudio Tessone offer a compelling glimpse into the intricate world of Decentralized Finance. The team from the University of Zurich delves into DeFi, contrasting it sharply with traditional financial systems (TradFi) and dissecting the risks embedded within DeFi protocols.
This paper ambitiously seeks to unravel the complexities of DeFi by systematically categorizing its protocols and assessing associated risks. By focusing on protocols that account for over 90% of total value locked (TVL) in DeFi, the authors ensure their findings are both relevant and comprehensive.
What is Total Value Locked (TVL)? Total Value Locked (TVL) quantifies the total value of digital assets staked or locked within a specific decentralized finance (DeFi) platform or application (dApp).

The researchers categorize DeFi protocols into three broad types: liquidity pools, pegged and synthetic tokens, and aggregators. Each category is meticulously analyzed for inherent risks and operational characteristics. The study highlights the pivotal role of blockchain technologies like Ethereum, which facilitate the execution of complex smart contracts essential for DeFi operations.

The paper's structured approach to classifying DeFi protocols is a powerful aspect. It not only clarifies the operational landscape of DeFi but also introduces a risk framework tailored for this modern financial sector.
Despite its strengths, the paper could enhance its utility with more detailed case studies on DeFi protocol failures. Such additions would provide deeper insight into practical vulnerabilities. An expanded discussion on the economic impacts of these technologies could provide a fuller picture of their potential systemic influence.
Surprisingly, the paper reveals that liquidity pools, fundamental to DeFi's operation, carry significant risks. These include impermanent loss and exposure to market volatility, which pose challenges to the perceived stability of DeFi platforms.

The research has significant implications, especially for regulators and DeFi participants. It paves the way for better regulatory frameworks by clearly understanding DeFi protocols and their risks. Additionally, insights into programmable blockchains could drive innovation, leading to safer and more efficient DeFi applications.
https://www.chainalysis.com/blog/defi-regulation-practical-next-steps-to-make-the-industry-safer/
"DeFi - Fundamentals, Taxonomy and Risks" is an essential guide for anyone exploring the DeFi ecosystem. It provides a thorough analysis of DeFi's operational and risk landscapes, advocating for more sophisticated regulatory and risk management strategies. The paper not only highlights the revolutionary potential of DeFi but also cautions against its vulnerabilities, encouraging a balanced and informed engagement with these technologies.
Discover how blockchain is transforming industries on the Blockchain Insights Hub. Follow me on Twitter for real-time updates on the intersection of blockchain and cybersecurity. Subscribe now to get my exclusive report on the top blockchain security threats of 2024. Dive deeper into my blockchain insights on Medium.
Understand the building blocks, categories, and vulnerabilities of DeFi. This article summarizes expert research for investors, enthusiasts, and regulators.
This article is also published on my Medium page.
In their scholarly article “SoK: Decentralized Finance (DeFi) — Fundamentals, Taxonomy and Risks,” authors Krzysztof Gogol, Christian Killer, Malte Schlosser, Thomas Bocek, Burkhard Stiller, and Claudio Tessone offer a compelling glimpse into the intricate world of Decentralized Finance. The team from the University of Zurich delves into DeFi, contrasting it sharply with traditional financial systems (TradFi) and dissecting the risks embedded within DeFi protocols.
This paper ambitiously seeks to unravel the complexities of DeFi by systematically categorizing its protocols and assessing associated risks. By focusing on protocols that account for over 90% of total value locked (TVL) in DeFi, the authors ensure their findings are both relevant and comprehensive.
What is Total Value Locked (TVL)? Total Value Locked (TVL) quantifies the total value of digital assets staked or locked within a specific decentralized finance (DeFi) platform or application (dApp).

The researchers categorize DeFi protocols into three broad types: liquidity pools, pegged and synthetic tokens, and aggregators. Each category is meticulously analyzed for inherent risks and operational characteristics. The study highlights the pivotal role of blockchain technologies like Ethereum, which facilitate the execution of complex smart contracts essential for DeFi operations.

The paper's structured approach to classifying DeFi protocols is a powerful aspect. It not only clarifies the operational landscape of DeFi but also introduces a risk framework tailored for this modern financial sector.
Despite its strengths, the paper could enhance its utility with more detailed case studies on DeFi protocol failures. Such additions would provide deeper insight into practical vulnerabilities. An expanded discussion on the economic impacts of these technologies could provide a fuller picture of their potential systemic influence.
Surprisingly, the paper reveals that liquidity pools, fundamental to DeFi's operation, carry significant risks. These include impermanent loss and exposure to market volatility, which pose challenges to the perceived stability of DeFi platforms.

The research has significant implications, especially for regulators and DeFi participants. It paves the way for better regulatory frameworks by clearly understanding DeFi protocols and their risks. Additionally, insights into programmable blockchains could drive innovation, leading to safer and more efficient DeFi applications.
https://www.chainalysis.com/blog/defi-regulation-practical-next-steps-to-make-the-industry-safer/
"DeFi - Fundamentals, Taxonomy and Risks" is an essential guide for anyone exploring the DeFi ecosystem. It provides a thorough analysis of DeFi's operational and risk landscapes, advocating for more sophisticated regulatory and risk management strategies. The paper not only highlights the revolutionary potential of DeFi but also cautions against its vulnerabilities, encouraging a balanced and informed engagement with these technologies.
Discover how blockchain is transforming industries on the Blockchain Insights Hub. Follow me on Twitter for real-time updates on the intersection of blockchain and cybersecurity. Subscribe now to get my exclusive report on the top blockchain security threats of 2024. Dive deeper into my blockchain insights on Medium.
No activity yet