Articles about Privacy - Section 2
Winning projects from hackathons hosted by Delphi Labs and Cosmos ecosystem
Winning projects include Account Abstraction as a Service, Perpetual Contract DEX, Wallet, and other projects.
Combining “Privacy Pools” and “Innocence Proofs”: How to effectively curb illegal activities while protecting privacy?
TornadoCash uses zero-knowledge proof technology to make fund sources untraceable. Can we find a way to allow users ...
Introducing Ark: a privacy-focused alternative Bitcoin scaling solution
Advocate of inclusive finance and Mandela Washington Fellow Kudzai Kutukwa published a commentary in Bitcoin Magazine...
a16z: A detailed explanation of the working principle of Cicada, a ZK-based on-chain voting project
In this article, we conducted research on the current state of voting privacy and provided a high-level introduction...
Vitalik: Three Transformations Ethereum Needs to Complete – L2, Wallets, Privacy
Original Title: The Three Transitions Original Author: vitalik Source: vitalik.eth Translation: MarsBit, MK Special t...
Zero Knowledge Machine Learning (zkML): Privacy and Technology Coexist in the Era of Artificial Intelligence
zkML essentially integrates ZK technology into AI software to overcome its limitations in privacy protection, data au...
Latest Interview with Zhao Changpeng: Being “Under the Microscope” of Regulation, Market is Recovering in Bearish Period
On May 29th, Binance CEO Changpeng Zhao gave an interview to Bankless discussing his views on the current state of th...
Key factors for the future large-scale adoption of DID and specific investment directions
Whether DID can reduce the threshold for first-time use and become the core layer for verification service providers ...
Bitcoin’s new generation of multi-signature scheme MuSig2: providing better security, efficiency, and privacy features
MuSig2 is a promising development in the world of Bitcoin. Compared to its predecessor, MuSig1, it offers improved se...
Why do I always receive “Exchange Withdrawal” messages? Learn about the classification and protection measures of Web3.0 data leakage events in this article.
This article will introduce you to the classification of Web3.0 data breaches and what measures we should take to pr...

- You may be interested
- Celestia: Modular Data Availability for...
- Exclusive Interview with Arbitrum Asia-...
- Can "Leek" view the whale pos...
- Bitcoin lending services really make mo...
- The first half of the open market finan...
- BIS: 2019 Central Bank Digital Currency...
- China Telecom Liang Wei: 5G, Blockchain...
- Sequoia Capital The challenging moment ...
- South Korea launches the Bank of Korea ...
- Nobel laureate Tirole: Humanity is faci...
- 5 Misconceptions About the Metaverse
- Long text: a feasibility framework for ...
- Vitalik on AI Will not replace humans, ...
- Unlock Bitcoin for more apps, Miniscrip...
- Is ETH changing from digital oil to dig...
Find your business way
Globalization of Business, We can all achieve our own Success.