Articles about Privacy - Section 2
Winning projects from hackathons hosted by Delphi Labs and Cosmos ecosystem
Winning projects include Account Abstraction as a Service, Perpetual Contract DEX, Wallet, and other projects.
Combining “Privacy Pools” and “Innocence Proofs”: How to effectively curb illegal activities while protecting privacy?
TornadoCash uses zero-knowledge proof technology to make fund sources untraceable. Can we find a way to allow users ...
Introducing Ark: a privacy-focused alternative Bitcoin scaling solution
Advocate of inclusive finance and Mandela Washington Fellow Kudzai Kutukwa published a commentary in Bitcoin Magazine...
a16z: A detailed explanation of the working principle of Cicada, a ZK-based on-chain voting project
In this article, we conducted research on the current state of voting privacy and provided a high-level introduction...
Vitalik: Three Transformations Ethereum Needs to Complete – L2, Wallets, Privacy
Original Title: The Three Transitions Original Author: vitalik Source: vitalik.eth Translation: MarsBit, MK Special t...
Zero Knowledge Machine Learning (zkML): Privacy and Technology Coexist in the Era of Artificial Intelligence
zkML essentially integrates ZK technology into AI software to overcome its limitations in privacy protection, data au...
Latest Interview with Zhao Changpeng: Being “Under the Microscope” of Regulation, Market is Recovering in Bearish Period
On May 29th, Binance CEO Changpeng Zhao gave an interview to Bankless discussing his views on the current state of th...
Key factors for the future large-scale adoption of DID and specific investment directions
Whether DID can reduce the threshold for first-time use and become the core layer for verification service providers ...
Bitcoin’s new generation of multi-signature scheme MuSig2: providing better security, efficiency, and privacy features
MuSig2 is a promising development in the world of Bitcoin. Compared to its predecessor, MuSig1, it offers improved se...
Why do I always receive “Exchange Withdrawal” messages? Learn about the classification and protection measures of Web3.0 data leakage events in this article.
This article will introduce you to the classification of Web3.0 data breaches and what measures we should take to pr...
- You may be interested
- Hong Kong's first trial virtual ba...
- Chain Travel Weekly (No. 26): "Egg...
- Will the cash between Alipay and WeChat...
- Introduction | Blockchain Project Finan...
- DeFi Ventures Framework announces $ 900...
- How can the POS network align with the ...
- Hash rate changes hidden mystery, BTC b...
- G20 began to implement a unified encryp...
- Perspectives | Stateless Clients: New T...
- 2019 semi-annual resumption: extreme ni...
- US Food and Drug Administration works w...
- The digital currency exchange has been ...
- MakerDAO community initiates a vote to ...
- Supervision stick, giant "encircle...
- Hangzhou accelerates the creation of th...
Find your business way
Globalization of Business, We can all achieve our own Success.