Результатов: 1047

TNW Answers’ best cryptocurrency and blockchain insights from 2018

Blockchain is brand new technology. Not only is it mostly untested, but the implications and use-cases of distributed ledger technology still aren’t fully realized, let alone understood. With our regular TNW Answers sessions, we’ve given leaders and disruptors of decentralized tech a platform to discuss and explore the bleeding-edge of the industry. дальше »

2019-1-3 15:00


Cryptocurrency Exchange Altcoin Delisting Ramps Up and Wraps Up 2018

Cryptocurrency investors aren’t the only ones dumping altcoins in 2018. Cryptocurrency exchanges, notably Kucoin (world’s ~54th largest) and Houbi (world’s 4th largest), have been delisting tokens and putting several tokens… The post Cryptocurrency Exchange Altcoin Delisting Ramps Up and Wraps Up 2018 appeared first on CoinCentral. дальше »

2019-1-1 01:24


Фото:

Blockchain Analysis Is About to Get Harder as P2EP Enters Testing Phase

Yet another tool is being added to Bitcoin’s growing number of privacy solutions. Thought up at a brainstorming event attended by Bitcoin developers and privacy researchers last summer, Pay to Endpoint (P2EP) is a relatively new trick that utilizes the well-known CoinJoin mixing technique to make blockchain analysis much harder. дальше »

2019-1-1 19:31


Фото:

Almost $1 Million Stolen in Phishing Attack on Electrum Wallet

Popular cryptocurrency wallet Electrum is in the midst of an ongoing hack which saw almost $1 million in Bitcoin stolen so far, Reddit users discovered on December 27, 2018. 250 BTC Stolen in Electrum Wallet Hack It seems that hackers aren’t lying idle during Christmas time, as a popular cryptocurrency wallet has reportedly experienced one of the largest thefts of. дальше »

2018-12-30 00:00


Фото:

This is the future of authentication, according to security experts

Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced to the world of computing. But as we’ve increasingly adopted a wide range of personal gadgets and online services, they’ve become a pain to manage, and a point of vulnerability that hackers can exploit when conditions are in their favor. дальше »

2018-12-19 12:00