orlin + cryptography   27

ZenGo - Bitcoin & Cryptocurrency Wallet
ZenGo is the first keyless bitcoin and cryptocurrency wallet — the most simple and secure way to manage your crypto assets.
mt  crypto  wallet  ux  cryptography  research  distributed  systems  security  ios  mobile  app 
8 weeks ago by orlin
Upload/Up1: Client-side encrypted image host web server
Client-side encrypted image host web server. Contribute to Upload/Up1 development by creating an account on GitHub.
encryption  file  server  cryptography  web  self  hosted  opensource  hacking  sharing  tool  secrets 
november 2018 by orlin
The Emergence of Cryptoeconomic Primitives – The Coinbase Blog
At some point in the past 6 months, you may have read or heard the terms “Cryptoeconomic Primitives”, “Financial Primitives”, “Crypto Primitives” or just “Primitives” being used in relation to some…
tokens  economics  cryptography  system  blockchain  2018  markets  utility  define 
october 2018 by orlin
A file-based secret management and distribution system
mt  served  tooled  secrets  storage  security  cryptography  passwords  keys  configuration  management  deployment  devops  server  keywhiz 
october 2018 by orlin
A Guide to Post-Quantum Cryptography | Trail of Bits Blog
For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately decrypting sensitive information. Here the threat model encompasses situations where the adversary may dedicate many years to the decryption of ciphertexts after their collection. One potential way forward…
quantum  cryptography  security  computing  algorithms  mathematics 
october 2018 by orlin
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.
mt  tooled  self  encryption  security  software  truecrypt  linux  mac  osx  windows  multiplatform  use  cryptography  filesystem  data  privacy  travel 
august 2018 by orlin
Quantum Computers Pose Imminent Threat to Bitcoin Security - MIT Technology Review
The massive calculating power of quantum computers will be able to break Bitcoin security within 10 years, say security experts.
bitcoin  security  quantum  computing  cryptography  finance  fintech 
april 2018 by orlin
Qubit Protocol
Qubit Protocol is a decentralised blockchain enabled governance protocol that utilises the collective intelligence of the quantum science community to make strategic funding decisions on quantum technology projects.
quantum  computing  investment  cryptography  cryptocurrency 
april 2018 by orlin
Critique of Buterin’s “A Proof of Stake Design Philosophy”
In this article, I take issue with several of the claims made by Vitalik Buterin in his Dec 2016 article “A Proof of Stake Design Philosophy”. My hope is that it sparks debate about proof-of-stake’s…
pow  pos  consensus  compare  bitcoin  ethereum  algorithm  philosophy  cryptography  future  crypto  casper 
january 2018 by orlin
New Method of Producing Random Numbers Could Improve Cybersecurity | UT News | The University of Texas at Austin
A new method for producing truly random numbers could be used to encrypt data, make electronic voting more secure and more accurately simulate complex systems such as Earth's climate.
random  number  mathematics  cryptography  security  crypto 
september 2017 by orlin
I2P Anonymous Network
Anonymous peer-to-peer distributed communication layer built with open source tools and designed to run any traditional Internet service such as email, IRC or web hosting.
anonymous  privacy  network  tor  compare  cryptography  anonymity  internet 
april 2016 by orlin
What Does it Take to Succeed as a Decentralized Autonomous Organization?
Venture advisor William Mougayar discusses what makes a successful Decentralized Autonomous Organisation, or DAO for short.
dao  define  trends  cryptography  blockchain  revolution 
april 2015 by orlin

related tags

activism  algorithm  algorithms  anonymity  anonymous  app  aws  backup  bestpractice  bitcoin  blockchain  casper  cheap  cloud  collaboration  communication  compare  computing  configuration  consensus  course  cryp  crypto  cryptocurrency  cryptography  dao  data  decentralization  define  deployment  devops  distributed  economics  education  email  encryption  ethereum  file  files  filesystem  finance  fintech  future  gpg  graph  hacking  hosted  hosting  howto  incremental  indieweb  information  innovation  internet  investment  ios  ipsec  keybase  keys  keywhiz  learning  ledger  linux  mac  management  markets  mathematics  mobile  motivation  mt  multiplatform  network  number  opensource  osx  packets  passwords  people  pgp  philosophy  pioneers  pos  pow  privacy  programming  public  quantum  random  research  resource  revolution  secrets  security  self  served  server  service  sharing  shorewall  software  storage  surveillance  sysadmin  system  systems  technology  tokens  tool  tooled  tor  travel  trends  truecrypt  trust  tunnel  usa  use  utility  ux  vpn  wallet  war  web  wiki  windows  writing 

Copy this bookmark: