|
You are here |
hackingdistributed.com | ||
| | | | |
www.dock.io
|
|
| | | | | Learn about the importance of Self-Sovereign Identity, how it works, and its benefits for organizations and individuals. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | A growing number decentralized finance products and services have created new sources of financial gain for many different threat actors. Analysis of principles, features, and underlying infrastructure of cryptocurrency systems provides better understanding of the attack surface and where resources can be directed and adapted efficiently as the space continues to rapidly expand | |
| | | | |
berty.tech
|
|
| | | | | Why a DAO for Berty? (Part I) TLDR: The Berty protocol will never depend on a Blockchain. We plan to set up a DAO to secure governance of its development team. Berty 's mission is to create a protocol and applications enabling secure p2p communication between people. More simply put, it means that Berty's applications will protect confidential conversations between individuals, including in adverse political situations that might compromise the security or the availability of the internet itself. | |
| | | | |
yesterweb.org
|
|
| | | A look at what is wrong with Web3. | ||