Новости о Encryption Next [ Фото новости ] [ Свежие новости ] | |
Op Ed: Bitcoin Is Turning Left vs. Right Into Big Data vs. Privacy
The political spectrum is usually divided into four main categories: libertarian left, authoritarian left, libertarian right and authoritarian right. Those on the left prefer a more controlled economy, while those on the right have a preference for free markets. дальше »
2019-4-16 22:26 | |
Here’s how personalized ransomware attacks work, and how to protect yourself
Once a piece of ransomware has got hold of your valuable information, there is very little you can do to get it back other than accede to the attacker’s demands. Ransomware, a type of malware that holds a computer to ransom, has become particularly prevalent in the past few years and virtually unbreakable encryption has made it an even more powerful force. дальше »
2019-3-28 19:54 | |
Stanford Student Calls Out Crypto Professor for Inaccurate Bitcoin Lecture
In January of 2019, student Conner Brown attended a guest lecture by a Professor Susan Athey at the University of Stanford Graduate School. She gave a presentation to his “Evolution of Finance” class titled “Blockchain and the Future of Finance. дальше »
2019-3-1 03:39 | |
Enjin Crypto Wallet launches in-app token conversion
CryptoNinjas Enjin Wallet, a cryptocurrency wallet application that utilizes the latest NSA-grade encryption and supports over 700 cryptocurrencies including non-fungible ERC-721 and ERC-1155 tokens has today revealed that their next wallet update. дальше »
2019-1-22 20:58 | |
IOTA is dishing out shares of $220K bounty — if you can crack its new hash function
IOTA Foundation, the company wanting to be the cryptocurrency for the Internet-of-Things (IoT), has just launched a new hash function, and it’s dishing out shares of a $220,000 (200,000 euro) bounty to anyone that can crack it. дальше »
2018-12-20 18:00 | |
Australia’s horrific new encryption law likely to obliterate its tech scene
Australia‘s government signed a bill into law last week giving law enforcement agencies the right to force technology companies to reveal users’ encrypted messages. Another way of putting it: Australia‘s tech scene will soon be located on the Wayback Machine. дальше »
2018-12-10 22:19 | |
Enjin smart wallet update will allow users to melt and send ERC-1155 tokens
CryptoNinjas Enjin Smart Wallet, a mobile cryptocurrency wallet that utilizes NSA-grade encryption, has announced that its next update will enable users to melt down ERC-1155 tokens into Enjin Coin (ENJ), allowing developers to back their assets with ENJ. дальше »
2018-10-26 18:15 | |
Google explains how its new Titan-M chip keeps the Pixel 3 secure
Despite its Google+ debacle, Google continues to claim that it pays close attention to the security of users. It has included a special chip in its new Pixel phones called Titan M, which protects consumers from bad actors. дальше »
2018-10-18 12:17 | |
Kik-approved messaging app caught storing user passwords in plain text
It appears that messaging app Blastchat – which was recently selected for Kik’s $3 million cryptocurrency developer program – has been caught storing sensitive user data, including passwords, in plain text. дальше »
2018-9-13 18:51 | |
BMW steps on the gas to define its ‘blockchain strategy’ with new startup accelerator program
Car manufacturer BMW has taken further steps in defining its blockchain strategy with the announcement of a new startup accelerator program. Two were picked from a category specifically for blockchain startups. дальше »
2018-9-12 15:43 | |
WhatsApp won’t help India monitor messages to stop fake news
Following a spree of lynchings across India spurred on by misinformation spread through messaging services like WhatsApp, the country’s IT minister Ravi Shankar Prasad asked the company to figure out a way to trace these misleading messages back to the original sender earlier this week. дальше »
2018-8-24 10:54 | |
13 things to consider before adopting end-to-end encryption
There is a lot to consider before making any technical change in your company’s operations. And when adopting end-to-end encryption, there are some specific considerations to make to get it right. дальше »
2018-8-3 10:00 | |
Turing probably can’t build its crazy new smartphone, but I’d love to see it try
Remember Turing Robotic Industries, the company that promised to build a smartphone with end-to-end encryption and a durable ‘Liquidmorphium’ body? That plan didn’t quite pan out, but the company is back with a new name – and a new device in the works. дальше »
2018-8-1 09:47 | |
STARKs, Part I: Proofs with Polynomials
Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency. дальше »
2018-7-21 23:03 | |