Tag cryptography

BEP44 For Decentralized Applications

In 2014 Arvid Norberg and Steven Siloti came up with a BitTorrent extension called BEP44. The basic purpose of BEP44 is to allow people...

Build a decentralized web chat in 15 minutes

This post originally appeared on the David Walsh blog. In this 15 minute tutorial we're going to build a simple decentralized chat...

Hashcash Auctions for Decentralized Resource Allocation

Abstract Hashcash is a mechanism for defending against spam and denial-of-service attacks in email and other decentralized systems....

Decentralized Identity Linking

A problem faced by decentralized systems is that of naming things. The problem is best expressed by Zooko's Triangle which conjectured...

On Self-hosting and Decentralized Software

Web applications often follow a client-server model meaning that there is a piece of software which runs in your web browser (the...

Hash Function Attacks Illustrated

Here are some illustrated explanations of the main ways in which cryptographic hash functions can be attacked, and be resistant to those...

Browser Blockchain in ClojureScript

I built a little blockchain-in-a-browser in ClojureScript to help understand the underlying algorithms. You can simulate a network of...

3d Printable Sixteen Sided Hexadecimal Die

This is a Hexadecimal die that you can 3d print. Download the STL file or get the source code on GitHub. Hopefully useful when...