How to Sign Up
Click "Claim This Topic" on any available topic. This opens a GitHub Issue where you enter your name and email. First come, first served!
Open Signup FormPresentation Guidelines
5-Minute Structure
- 0:00-0:30Hook & Introduction
- 0:30-1:30Background/Context
- 1:30-3:30Main Content
- 3:30-4:30Real-World Impact
- 4:30-5:00Key Takeaway
Grading (20 Points)
- Content Accuracy5 pts
- Clarity of Explanation5 pts
- Visual Aids Quality4 pts
- Time Management3 pts
- Engagement/Delivery3 pts
Submission
- FormatPDF slides
- Upload toMoodle
- Deadline1 day before
- Slides5-8 recommended
- LanguageEnglish or German
Byzantine Fault Tolerance Explained
Explain the Byzantine Generals Problem and how BFT consensus algorithms solve it. Cover practical applications in blockchain.
Nakamoto Consensus Deep Dive
Analyze Bitcoin's consensus mechanism: longest chain rule, probabilistic finality, and security assumptions.
Proof of Stake vs Proof of Work Economics
Compare the economic incentives, security models, and environmental impact of PoS vs PoW consensus.
Cryptographic Hash Functions in Blockchain
Explain SHA-256 and other hash functions: properties, applications in mining, Merkle trees, and data integrity.
Digital Signatures & Public Key Cryptography
Cover ECDSA, Schnorr signatures, and how public key cryptography enables trustless ownership.
Merkle Trees & Data Integrity
Explain Merkle trees, SPV proofs, and how they enable light clients to verify transactions efficiently.
Game Theory in Blockchain Consensus
Analyze Nash equilibria in mining/staking, selfish mining strategies, and incentive alignment.
The Double-Spending Problem
Explain why double-spending was the core problem Bitcoin solved and how confirmation depth provides security.
Blockchain Trilemma Analysis
Analyze the scalability trilemma: decentralization vs security vs scalability trade-offs across different blockchains.
Nothing-at-Stake Problem in PoS
Explain the nothing-at-stake attack, why it's unique to PoS, and how slashing mechanisms prevent it.
Bitcoin Lightning Network
Explain payment channels, HTLCs, routing, and how Lightning enables instant Bitcoin payments.
Ethereum 2.0 Beacon Chain
Explain the Beacon Chain architecture, validator duties, epochs, slots, and Casper FFG finality.
Solana's Proof of History
Explain Proof of History, Tower BFT, and how Solana achieves high throughput. Discuss trade-offs.
Cosmos IBC Protocol
Explain Inter-Blockchain Communication, light clients, relayers, and the Cosmos Hub ecosystem.
Polkadot Parachains
Explain the relay chain, parachains, shared security model, and parachain auctions.
Avalanche Consensus
Explain Avalanche's novel consensus using repeated sub-sampling and how subnets enable customization.
Arbitrum vs Optimism Comparison
Compare the two leading optimistic rollups: architecture, fraud proofs, tokenomics, and ecosystem.
zkSync & ZK-Rollups
Explain zero-knowledge proofs, zkSync's architecture, and why ZK-rollups may be the future of scaling.
Polygon PoS Architecture
Explain Polygon's architecture, its evolution from Matic, and the various Polygon chains (PoS, zkEVM).
Base (Coinbase L2)
Explain Base's architecture, relationship to Optimism, and Coinbase's strategy for mainstream adoption.
Uniswap V3 Concentrated Liquidity
Explain concentrated liquidity positions, capital efficiency gains, and LP strategy considerations.
Aave Flash Loans Mechanics
Explain flash loans, use cases (arbitrage, liquidations, collateral swaps), and risks.
MakerDAO & DAI Stability
Explain CDP mechanics, stability fees, liquidations, and how DAI maintains its peg.
Curve Finance & Stablecoin AMMs
Explain StableSwap invariant, low slippage for pegged assets, and the Curve Wars.
Lido & Liquid Staking
Explain liquid staking derivatives, stETH mechanics, and centralization concerns.
Compound Interest Rate Model
Explain utilization-based interest rates, cTokens, and governance token distribution.
dYdX Perpetual Futures
Explain perpetual contracts, funding rates, and decentralized derivatives trading.
Pendle & Yield Tokenization
Explain yield tokenization, PT/YT tokens, and fixed-rate yield strategies.
EigenLayer Restaking
Explain restaking, actively validated services (AVS), and shared security implications.
Morpho Lending Optimization
Explain peer-to-peer lending optimization, rate improvement, and Morpho Blue architecture.
BAYC & PFP Culture Analysis
Analyze Bored Ape Yacht Club's success, community building, and the PFP NFT phenomenon.
Art Blocks & Generative Art
Explain generative art NFTs, on-chain art, and notable Art Blocks collections (Fidenza, Chromie Squiggle).
OpenSea vs Blur Market Dynamics
Compare marketplace strategies, fee structures, royalty policies, and the aggregator wars.
NFT Royalty Enforcement Problem
Explain the royalty bypass problem, on-chain vs off-chain enforcement, and creator economics.
Ordinals & Bitcoin NFTs
Explain Bitcoin Ordinals, inscriptions, BRC-20 tokens, and the debate around Bitcoin block space.
Soulbound Tokens (SBTs)
Explain non-transferable tokens for identity, credentials, reputation, and Vitalik's vision.
Dynamic NFTs
Explain NFTs that change based on external data, oracles, and interactive art experiences.
Music NFTs & Artist Royalties
Explore music NFT platforms, streaming royalty tokenization, and artist-fan relationships.
Gaming NFTs Economy (Axie, Gods Unchained)
Analyze play-to-earn economics, in-game asset ownership, and sustainability challenges.
RWA Tokenization (BlackRock BUIDL)
Explain real-world asset tokenization, BlackRock's BUIDL fund, and institutional adoption.
The DAO Hack (2016)
Analyze the DAO hack, reentrancy vulnerability, Ethereum hard fork decision, and lessons learned.
Terra/Luna Collapse Analysis
Deep dive into the death spiral mechanics, Anchor's role, and systemic risk lessons.
FTX Fraud & Lessons
Analyze the FTX collapse, Alameda relationship, lack of controls, and regulatory implications.
Ronin Bridge Hack
Analyze the $620M Ronin bridge hack, validator key compromise, and bridge security lessons.
Wormhole Exploit
Analyze the $320M Wormhole exploit, signature verification bug, and cross-chain bridge risks.
Reentrancy Attack Patterns
Explain reentrancy vulnerabilities, checks-effects-interactions pattern, and prevention techniques.
Flash Loan Attack Vectors
Analyze flash loan attacks: oracle manipulation, governance attacks, arbitrage exploits.
MEV & Sandwich Attacks
Explain MEV extraction, sandwich attacks, Flashbots, and MEV mitigation strategies.
Smart Contract Audit Process
Explain the audit lifecycle, common findings, audit firms, and what makes a good audit.
Bug Bounty Programs in Crypto
Analyze bug bounty economics, Immunefi, notable payouts, and responsible disclosure.
SEC vs Ripple Case
Analyze the landmark case, Howey Test application, and implications for crypto regulation.
EU MiCA Regulation
Explain MiCA framework, CASP requirements, stablecoin rules, and implementation timeline.
Swiss FINMA Framework
Explain Switzerland's crypto-friendly approach, token classification, and Crypto Valley.
US Bitcoin ETF Impact
Analyze spot Bitcoin ETF approval, inflows, impact on price, and institutional adoption.
CBDC Designs Comparison
Compare CBDC approaches: China's e-CNY, Digital Euro, privacy considerations.
Crypto Taxation Strategies
Explain FIFO/LIFO, DeFi tax events, reporting requirements, and tax-loss harvesting.
Stablecoin Regulation (USDC, USDT)
Compare regulatory approaches to stablecoins, reserve requirements, and transparency.
KYC/AML in DeFi
Explore the tension between DeFi's permissionless nature and regulatory KYC/AML requirements.
DAO Legal Structures
Explore DAO legal wrappers, Wyoming DAO LLC, liability, and governance challenges.
Crypto Exchange Business Models
Analyze CEX vs DEX revenue models, trading fees, listing fees, and competitive dynamics.
| # | Title | Category | Status | Action |
|---|