Categories
NEWS

DapCash Today

So, the current update of our project. We briefly tell you what the current state of DapCash is. We remind you that our project started in December 2017. And has come a long way in the last couple of years. Our achievements for today: * We have an MVP, namely:

Read More »
Shor's algorithm
Blockchain

Shor’s algorithm against blockchain

Peter Shor and his algorithm Scientists are amazing people, they just can’t live without inventions or discoveries. And then the whole world has to think what to do with these discoveries. For example, atomic energy is as useful as it is dangerous. And Peter Shor with his algorithm is a

Read More »
Blockchain

Sharding – why does blockchain need it?

Sharding is a solution for the problem of blockchain scalability Before talking about sharding, it is worth noting essential circumstance. Any fast-growing blockchain sooner or later faces the problem of scalability. The decentralization and security of blockchain are ensured by reaching a consensus between nodes and storing all the blockchain

Read More »
Quantum computer will hack Bitcoin
Blockchain

Will the quantum computer hack Bitcoin and other cryptocurrencies?

Whether Bitcoin and its’ forks can resist quantum computing? This question divides the crypto community into two opposing groups. On the one hand, crypto-enthusiasts believe Bitcoin can resist quantum technologies. On the other hand, crypto-realists pay much more attention to quantum safety. Let’s look at the arguments of both groups

Read More »
quantum computer vulnerability
Encryption

One important “but”: The Quantum Vulnerability

There is another important nuance, which concerns encryption algorithms. In particular, asymmetric ones. As a rule, when we talk about the cryptographic robustness of algorithms, we are referring to cryptanalysis performed with classical computers. But quantum computers already exist. Quantum computer vs classic computer What is the difference between a

Read More »
The Asymmetric Algorithm ECDSA
Encryption

The Asymmetric Algorithm ECDSA

We told in detail about the asymmetric encryption. And the RSA algorithm which is currently outdated. Now we are talking about another well – known algorithm of asymmetric encryption. This is ECDSA (Elliptic Curve Digital Signature Algorithm). What is ECDSA Unlike RSA, ECDSA is based on far more complex mathematical

Read More »
TON
Blockchain

What is TON in fact. A critical view

TON – LEGENDARY ICO OF 2018 In early 2018, sensational ICO from Pavel Durov raised 1.7 billion dollars. The distinctive feature of this mega – project is a skillful PR. No official statements from Pavel Durov. And chronicle “leaks” of information on the project. Of course, Pavel Durov is a

Read More »

Decentralized VPN service of a new generation based on the post-quantum blockchain

40% off

don't miss it!