Reserved IP Address°C
03-09-2025
BSV
$35.42
Vol 16.25m
-1.22%
BTC
$86186
Vol 16868.86m
-0.19%
BCH
$381.39
Vol 210.42m
-0.92%
LTC
$101.68
Vol 525.23m
-2.88%
DOGE
$0.19
Vol 868.99m
-3.55%

Tech

Alleged Russian ransomware attacker indicted, faces extradition from the Netherlands
-
23 August, 2022

Alleged Russian ransomware attacker indicted, faces extradition from the Netherlands

Denis Mihaqlovic Dubnikov and his co-conspirators, who are yet to be identified, are accused of laundering as much as $70...
Scalable peer to peer tokens on Bitcoin: Solve the back-to-Genesis problem using recursive SNARKs
-
21 August, 2022

Scalable peer to peer tokens on Bitcoin: Solve the back-to-Genesis problem using recursive SNARKs

sCrypt presents a simple NFT example using recursive SNARKs, which can be extended to a directed acyclic graph (DAG), rather...
Kazakhstan: Police arrest gang forcing IT specialists to operate block reward mining farms
-
11 August, 2022

Kazakhstan: Police arrest gang forcing IT specialists to operate block reward mining farms

The MIA's investigations found that the gang had been forcing an IT specialist to run its illegal block reward mining...
Recursive Zero-Knowledge Proofs: Proof of a proof of a proof…
-
8 August, 2022

Recursive Zero-Knowledge Proofs: Proof of a proof of a proof…

In this article, sCrypt presented the recursive Zero-Knowledge Proofs (ZKPs), where a proof attests to the validity of another proof.
Create your first zero-knowledge proof program on Bitcoin: A practical step-by-step guide
-
8 August, 2022

Create your first zero-knowledge proof program on Bitcoin: A practical step-by-step guide

Zokrates is a toolbox for zkSNARKs, hiding significant complexity inherent to ZKP, and provides a python-like higher-level language for developers...
North Korean hackers plagiarizing LinkedIn and Indeed resumes to seek jobs at digital assets firms: report
-
6 August, 2022

North Korean hackers plagiarizing LinkedIn and Indeed resumes to seek jobs at digital assets firms: report

Mandiant Inc., a cyber threat defense solutions provider, found that the hackers aim to gather intelligence about these firms' upcoming...
Advertisement