Cryptocurrencie$
The role of miners
Transactional properties
"Man in the middle" attack vulnerabilities
Cryptocurrencies emerged as a side product of another invention.
People with specialized computers to process transactions by contributing their electricity and computer processing power to the network.
In exchange, they receive transaction fees and/or new bitcoins that are released into the network by the protocol when a new block is added to the chain.
Miners provide a public service by securing the network and the network rewards them for their work.
For this to work, users broadcast transactions to the network and miners record them by racing to complete complex mathematical puzzles.
"Proof-of-work"
Each new block is added to the blockchain and those transactions are confirmed and recorded every 10 minutes.
Then the miners’ race for the next block begins.
SHA-256
Hackers know that we rely on secrets to guarantee the integrity of our identities and security of our communications.
A way to authenticate yourself, communicate and share information without the need to exchange secrets...
That is the main idea behind secret-less protocols such as Secret Double Octopus.
Enables different parties to verify each other’s’ identities without the need to exchange keys or reveal critical information.
Neither store nor send passwords or keys.
ДИ ЕНД.