SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
John D. Cook | Applied Mathematics Consulting
Why use hash puzzles for proof-of-work?
Why do cryptocurrencies use hash-based puzzles to demonstrate proof-of-work? Why not some more intrinsically useful problem?
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
John D. Cook | Applied Mathematics Consulting
Equivalence between commonly used elliptic curves
The elliptic curves Ed25519 and Curve25519 are both used in cryptography, and are equivalent in one sense and not in another.
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
John D. Cook | Applied Mathematics Consulting
Whimsical elliptic curves in Zcash zero knowledge proofs
Several elliptic curves which Zcash uses in zero knowledge proofs are named after characters from Lewis Carroll: Jubjub, Bandersnatch, Tweddledee, Tweedledum
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
Bitcoin Lens:
How Bitcoin Ensures No One Can Cheat
How Bitcoin Ensures No One Can Cheat
YouTube
How Bitcoin Ensures No One Can Cheat
Can Bitcoin really prevent fraud without a central authority? In this video, we break down the core mechanisms that make Bitcoin uncheatable—from blockchain immutability to Proof of Work and cryptographic signatures. Discover how Bitcoin enforces honesty…
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
John D. Cook | Applied Mathematics Consulting
Looking back at Martin Gardner’s RSA article
Looking back at the article that popularized public key cryptography, Martin Gardner's article on RSA from September 1977.
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
Bitcoin Lens:
The Secret Behind a Bitcoin Address
The Secret Behind a Bitcoin Address
YouTube
The Secret Behind a Bitcoin Address
In this video, we uncover the hidden layers of cryptography, ownership, and digital identity embedded in every Bitcoin address. From private keys to Taproot, discover how a simple string of characters unlocks the freedom, privacy, and power of decentralized…
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
#Linux #Distro #Android #Windows #Mobility #Hardware #Ecosystem #Post_Quantum #Cryptography #Quantum_Safe #Security #Communications #infrastructure #cybersecurity #infosec #Network_Security
source
source
Purism
Introducing the Librem PQC Comms Server – Purism
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.
SATOSHI ° NOSTR ° AI LLM ML RL ° LINUX ° MESH IoT ° BUSINESS ° OFFGRID ° LIFESTYLE | HODLER TUTORIAL
#Linux #Distro #Applications #Government_Mobility #Industry #Librem #Mobile #Ecosystem #N79 #Quantum #Cryptography
source
source
Purism
Quantum Safe Private Communications: Building the Future Before the Threat Arrives – Purism
Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security.