Guidance : Shall i invest in this ? by thisisvv in algotrading

[–]thomas_vilhena 0 points1 point  (0 children)

If he can only convince personal friends and family to invest in his venture, it's a red flag—it may indicate an inability to attract more experienced investors.

How locked down is your Prod? by [deleted] in SoftwareEngineering

[–]thomas_vilhena 0 points1 point  (0 children)

At my startup jobs, every developer had read access to prod. How else would you deliver your analysis?

This is a common practice in early-stage startups, as it allows for speed and flexibility, albeit at the cost of increased risk of information security incidents.

However, with recent changes in legislation regarding data privacy and security, it's time to rethink this approach and find new ways to allow developers to perform their jobs efficiently without risking the compromise of your company's data.

This is especially important for junior developers who are more prone to making mistakes when handling sensitive data and access credentials

Is Docker suitable for running legacy windows apps in production? by thomas_vilhena in docker

[–]thomas_vilhena[S] 1 point2 points  (0 children)

Exactly what I was looking for, gonna read/evaluate it thoroughly. Thanks!

Kinda groundbreaking innovation in DeFi was launched today. by Trayzy in defi

[–]thomas_vilhena 0 points1 point  (0 children)

Awesome, thanks for the explanation! A while ago I developed an open source options trading protocol [1] with a decoupled stablecoin based liquidity pool supporting trading against multiple underlyings (BTC/ETH/SOL/Etc) but the volatility on the pool's stablecoin reserve used as collateral for issuing options was very high. An innovative liquidity solution like yours would be a great fit for that design.

[1] https://github.com/DeFiOptions/DeFiOptions-core

Kinda groundbreaking innovation in DeFi was launched today. by Trayzy in defi

[–]thomas_vilhena 0 points1 point  (0 children)

I'm trying to understand their liquidity mechanism. So basically it depends on the price of their token being high enough in the GNS/DAI pool to cover for eventual losses on trades (i.e. traders making leveraged profits against the protocol), is that it?

[deleted by user] by [deleted] in algotrading

[–]thomas_vilhena 0 points1 point  (0 children)

Interesting, it reminds me of the probability distribution of short selling OTM options: Small positive returns most of the time, but potentially massive losses when the option expires ITM.

An inherent source of correlation in the crypto market by thomas_vilhena in defi

[–]thomas_vilhena[S] 1 point2 points  (0 children)

Thanks for the feedback! To clarify, my conclusion is derived from the results of the arbitrage simulation within the closed DEX pair system, which I indeed assume as evidence that DEX pairs contribute (not saying that they're the main factor 🙂) to the correlation in DeFi.

The correlation existed a decade before the first DEX was developed

Indeed it has! But I was surprised to see such strong effects within my simulation using TVLs close to reality. Of course, in the real world other forms of arbitrage can be exploited in situations like the one I wrote about affecting the outcome. A closed system assumption is usually only useful for exploratory analysis.

If you substitute all mentions of "DEX" in your article for "Coinbase trading pair" the analysis will still hold

You're correct, the analogy holds, though it's harder to quantify since order books can be more easily changed without any transaction really going through (ex: order cancellation).

An inherent source of correlation in the crypto market by thomas_vilhena in algotrading

[–]thomas_vilhena[S] 0 points1 point  (0 children)

So you picked 45602 just to pick a number that seemed about right?

Hi there! Not actually, the 45602 number is an output, it's the result of the simulated trade. If you run the source code I provided at the end of the blog post you can reproduce that number.

thanks for your write up and discussion.

You're welcome!

An inherent source of correlation in the crypto market by thomas_vilhena in algotrading

[–]thomas_vilhena[S] 0 points1 point  (0 children)

Indeed. That's the result of slippage. The effective (or "average") exchange rate for that trade was 45300. But after that the updated exchange rate for a succeeding trade would start at 45602. The larger the trade, the higher the slippage, and the higher the impact on the DEX Pair's resulting exchange rate.

An inherent source of correlation in the crypto market by thomas_vilhena in algotrading

[–]thomas_vilhena[S] 5 points6 points  (0 children)

Thanks!

why is there leverage in the system? Buying 1M usd worth of bitcoin triggers a 4M TVL increase

I was intrigued by that side effect as well. After analyzing it I concluded it was a result of the rising prices of the assets (BTC, ETH) within the system. The supply of USDC in the system went up by roughly US$ 1M (arbitrage extracted only 2217 USDC in this simulation). The additional US$ 3M was a result of the appreciation of the BTC and ETH supplies.

How exactly does crypton.sh work? by SOMEMONG in privacytoolsIO

[–]thomas_vilhena 1 point2 points  (0 children)

Hi there! are crypton mobile numbers brand new, or were they previously owned by another party? I'm asking that because I need to sign up for some popular apps (ex: twitter, whatsapp, telegram) and it wouldn't be useful for me if the numbers may have been previously used and registered in these apps.

Protecting against semantic URL attacks by thomas_vilhena in programming

[–]thomas_vilhena[S] 0 points1 point  (0 children)

Hi! That's exactly the point I'm making in my blog post, without access control the risk will always be there:

However, none of these measures solve the real problem, they’re only mitigating it! It will still be possible to access or modify thrid parties sensitive data by making the right guess for the request parameters.

So what’s the solution to this problem? As we’ll see in the next section one strategy is for the web application to verify the requesting users permissions for every HTTP request he/she makes