Blockchains are intended to be immutable, so an attacker who is able to delete transactions through a chain reorganization (a malicious reorg) can perform a profitable double-spend attack.

Quantum computers are not an immediate threat to Solana, but the protocol should begin preparing for the transition to post-quantum cryptography. This post outlines practical migration paths for transaction signatures, consensus, and existing wallets, while preserving flexibility as the underlying research continues to evolve.
Quantum computers are not an immediate threat to Solana, but the protocol should begin preparing for the transition to post-quantum cryptography. This post outlines practical migration paths for transaction signatures, consensus, and existing wallets, while preserving flexibility as the underlying research continues to evolve.
We believe permissionless blockchains have reached the point where the market structures built atop them can not only provide comparable execution to centralized exchanges but outcompete them entirely. Today PropAMMs on Solana are the first evidence of that new beginning.
We believe permissionless blockchains have reached the point where the market structures built atop them can not only provide comparable execution to centralized exchanges but outcompete them entirely. Today PropAMMs on Solana are the first evidence of that new beginning.
Why we believe Shelby can operate at prices that are competitive with existing Web2 providers, like AWS and GCP.
Why we believe Shelby can operate at prices that are competitive with existing Web2 providers, like AWS and GCP.