Ever wondered how hackers work? On this episode we brought back Information Security (InfoSec) professional and Certified Ethical Hacker, Frank Trezza, to tell us. He helps illuminate where various data vulnerabilities are and...
Category - Privacy Tech
This section is all about Privacy Tech like Tor, I2p, VPNs, zero knowledge proofs and ring signatures. We will cover any other types of privacy technology that we dig up. Safe travels.
What is Monero (XMR)? A Untraceable Privacy Focused Cryptocurrency
Originally published on CoinCentral: What Is Monero? Monero, a fork of Bytecoin, is a secure, private, and untraceable currency, built on the Cryptonote protocol using Ring Signatures. Proof of Work mechanism called...