Sublime
An inspiration engine for ideas

cryptography (via hash codes) is used to secure the authentication of the transaction source and removes the need for a central intermediary.
William Mougayar • The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology
The index number used in the derivation function is a 32-bit integer. To easily distinguish between keys created through the normal derivation function versus keys derived through hardened derivation, this index number is split into two ranges. Index numbers between 0 and 231 – 1 (0x0 to 0x7FFFFFFF) are used only for normal derivation. Index
... See moreDavid A. Harding • Mastering Bitcoin
Nakamoto combined several prior inventions such as digital signatures and Hashcash to create a completely decentralized electronic cash system that does not rely on a central authority for currency issuance or settlement and validation of transactions. A key innovation was to use a distributed computation system (called a “proof-of-work” algorithm)
... See moreDavid A. Harding • Mastering Bitcoin
Technical Engineering When creating a token system, one first needs to decide whether to create a token using an existing blockchain network and other Web3 infrastructure, or if the token can be deployed on an existing blockchain infrastructure.
Shermin Voshmgir • Token Economy: Money, NFTs & DeFi
Cripto Troffei
@cripto







