Sublime
An inspiration engine for ideas
Public key cryptography, or the use of encryption to secure information against unwanted access by third parties, was discovered in 1973. Research on and access to encryption technologies were highly embargoed.
Friends with Benefits (FWB) • A Political History of DAOs
The Hack-Proof Password System: Protect Yourself Online With a Memory Expert's In-Depth Guide to Remembering Passwords
amazon.com


Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts
amazon.com
it’s the weakest link in the blockchain – you and me? Whether it is a decentralised blockchain or a centralised system, hackers will target human weakness.
Tim Lea • Blockchain: Down The Rabbit Hole: (Discover The Power Of The Blockchain)
TRUSTING A TRUSTLESS NETWORK. The Paradoxes of Trust in Blockchain Technology
JENA MARIE ESPELITAassociazioneblockchain.it
The technology of the Information Age makes it possible to create assets that are outside the reach of many forms of coercion. This new asymmetry between protection and extortion rests upon a fundamental truth of mathematics. It is easier to multiply than to divide.