Articles about Privacy - Section 4
a16z: A detailed explanation of the working principle of Cicada, a ZK-based on-chain voting project
In this article, we conducted research on the current state of voting privacy and provided a high-level introduction...
Vitalik: Three Transformations Ethereum Needs to Complete – L2, Wallets, Privacy
Original Title: The Three Transitions Original Author: vitalik Source: vitalik.eth Translation: MarsBit, MK Special t...
Zero Knowledge Machine Learning (zkML): Privacy and Technology Coexist in the Era of Artificial Intelligence
zkML essentially integrates ZK technology into AI software to overcome its limitations in privacy protection, data au...
Latest Interview with Zhao Changpeng: Being “Under the Microscope” of Regulation, Market is Recovering in Bearish Period
On May 29th, Binance CEO Changpeng Zhao gave an interview to Bankless discussing his views on the current state of th...
Key factors for the future large-scale adoption of DID and specific investment directions
Whether DID can reduce the threshold for first-time use and become the core layer for verification service providers ...
Bitcoin’s new generation of multi-signature scheme MuSig2: providing better security, efficiency, and privacy features
MuSig2 is a promising development in the world of Bitcoin. Compared to its predecessor, MuSig1, it offers improved se...
Why do I always receive “Exchange Withdrawal” messages? Learn about the classification and protection measures of Web3.0 data leakage events in this article.
This article will introduce you to the classification of Web3.0 data breaches and what measures we should take to pr...
Viewing the privacy of the cryptocurrency era from the "room N incident": most cryptocurrencies in the market are not truly anonymous
Source: LongHash Editor's Note: The original title was "Privacy and Regulation in the Era of Cryptocurrency...
How to choose the cryptography technology? Revisiting the Security Model of Engineering Capability Boundaries
Author: Li Haoxuan Source: Weizhong Bank Blockchain Unbreakable cryptographic algorithms are also afraid of physical ...
How to choose the cryptography technology? Preliminary Study on Security Model of Theoretical Capability Boundary
Author: Li Haoxuan Source: Weizhong Bank Blockchain After the system changes, why does the privacy data leak frequent...
- You may be interested
- Taproot Wizards achieved success despit...
- Crypto for Advisors: Web3 Takes the Stage
- The Sneaker Sneak Nike Introduces Revol...
- Why did the mining pool business become...
- Wu Jihan came out of the mountain, Matr...
- The Rise of Intents: Fueling the Blockc...
- "Westward Journey of the Block&quo...
- Providing payment channels for virtual ...
- Getting started with blockchain | Let E...
- Academic Direction | How does Bitcoin d...
- Wuzhen·DeFi and CeFi must have a b...
- Bitcoin bounces back as $150K target fo...
- SEC Leaves Investors in Grayscale ̵...
- Market Analysis: On May 8th, the bookma...
- Who will confirm the identity of 1 bill...
Find your business way
Globalization of Business, We can all achieve our own Success.