Articles about Privacy - Section 2
Winning projects from hackathons hosted by Delphi Labs and Cosmos ecosystem
Winning projects include Account Abstraction as a Service, Perpetual Contract DEX, Wallet, and other projects.
Combining “Privacy Pools” and “Innocence Proofs”: How to effectively curb illegal activities while protecting privacy?
TornadoCash uses zero-knowledge proof technology to make fund sources untraceable. Can we find a way to allow users ...
Introducing Ark: a privacy-focused alternative Bitcoin scaling solution
Advocate of inclusive finance and Mandela Washington Fellow Kudzai Kutukwa published a commentary in Bitcoin Magazine...
a16z: A detailed explanation of the working principle of Cicada, a ZK-based on-chain voting project
In this article, we conducted research on the current state of voting privacy and provided a high-level introduction...
Vitalik: Three Transformations Ethereum Needs to Complete – L2, Wallets, Privacy
Original Title: The Three Transitions Original Author: vitalik Source: vitalik.eth Translation: MarsBit, MK Special t...
Zero Knowledge Machine Learning (zkML): Privacy and Technology Coexist in the Era of Artificial Intelligence
zkML essentially integrates ZK technology into AI software to overcome its limitations in privacy protection, data au...
Latest Interview with Zhao Changpeng: Being “Under the Microscope” of Regulation, Market is Recovering in Bearish Period
On May 29th, Binance CEO Changpeng Zhao gave an interview to Bankless discussing his views on the current state of th...
Key factors for the future large-scale adoption of DID and specific investment directions
Whether DID can reduce the threshold for first-time use and become the core layer for verification service providers ...
Bitcoin’s new generation of multi-signature scheme MuSig2: providing better security, efficiency, and privacy features
MuSig2 is a promising development in the world of Bitcoin. Compared to its predecessor, MuSig1, it offers improved se...
Why do I always receive “Exchange Withdrawal” messages? Learn about the classification and protection measures of Web3.0 data leakage events in this article.
This article will introduce you to the classification of Web3.0 data breaches and what measures we should take to pr...
- You may be interested
- A picture to understand: how digital cu...
- Skyrocketing 126.97%, Blockchain concep...
- Monthly market report|Investor's p...
- Facebook hearing testimony exposure: Li...
- Early return on investment is up to 200...
- Bitcoin "Trojan Horse": 6 big...
- Summarizing the three major innovations...
- Identifying indicators such as the prop...
- BTC returned to 5200, is it really pull...
- Cosmos and Polkadot: Interoperability o...
- In 2019, BTC rose 45%, and digital gold...
- Traditional institutions are eager to t...
- Hong Kong’s OSL Crypto Exchange U...
- USDT Thunder, how big is the impact on ...
- The Influence of Libra on the Renminbi ...
Find your business way
Globalization of Business, We can all achieve our own Success.