Articles about Bitcoin - Section 29

Plasma: Ethereum chain scalability framework combat part 1

There are two general methods for extending blockchains, the first and second layer solutions. The former is a so-cal...

Technical Guide | Web3.js is based on the Ethereum Javascript API

Web3.js is a collection of libraries that you can use to connect to a local or remote Ethernet node using HTTP or IPC...

Some science about Ethereum 2.0

Ethereum 2.0 At the beginning of March, after the “Istanbul” upgrade, Ethereum officially “quiet...

How is practical programmability implemented in the securities pass?

Recently, someone asked me what is the most interesting function of the securities pass. The author's answer is ...

Decred technical white paper Chinese version

Two years ago, I took the time to translate the technical white paper of Decred. The original address is: https://dec...

Elliptic Curve Cryptography & Workload Proof

Most cryptographic assets use an elliptical curve identical to Bitcoin, called secp256k1. This makes it possible to r...

Technical Guide | Ethereum Wallet Development: Generate Account Address, Private Key, Keystore, mnemonic

First, use web3 to connect to the Ethereum network (test network, main network) 1. What is web3 Web3 is a module prov...

Restoring the entire process of asset transfer: $6.02 million stolen from the DragonEX exchange

In the early morning of March 24th, Beijing time, the DragonEX exchange issued a notice stating that its platform dig...

Popular Science | Hash Function Brief

Hash functions are an integral part of blockchain technology and can be used for a variety of purposes. It is a mathe...

The first long-term supported version, Hyperledger launches Fabric v1.4 LTS

Recently, Hyperledger (superbook) has launched a new version of Fabric v1.4 LTS, this version is its first long-term ...

Find your business way

Globalization of Business, We can all achieve our own Success.

Advertising with us