In an increasing number of concerns about data privacy, the government began to act to develop a ...
Recently, someone asked me what is the most interesting function of the securities pass. The auth...
Two years ago, I took the time to translate the technical white paper of Decred. The original add...
Most cryptographic assets use an elliptical curve identical to Bitcoin, called secp256k1. This ma...
First, use web3 to connect to the Ethereum network (test network, main network) 1. What is web3 W...
In the early morning of March 24th, Beijing time, the DragonEX exchange issued a notice stating t...
Hash functions are an integral part of blockchain technology and can be used for a variety of pur...
This article is the first in a series of "In-depth Understanding of IPFS" series. This ...
Recently, Hyperledger (superbook) has launched a new version of Fabric v1.4 LTS, this version is ...
As mentioned in the previous article, the three factors of reward reduction, mining difficulty co...