steal-video

As we all know that “security via obscurity” is a bad thing, common people will always believe that.

Remember, only encryption gives you security for some extend.

Read More

TechBasic

Three key components

  • Cryptographic hash function

  • Asymmetric cryptograph(Digital Signature)

  • Consensus algorithm

Read More

Money-Ledger-Bitcoin

Four force you need to consider before you do something

  • Market(Business)

  • Technology

  • Law(Politics)

  • Social Norm(People)

What is a ledger

  • economic activity

  • financial relationship