by Valentin | Sep 11, 2018
Cryptography & Blockchain If two or more people want to securely transact over the internet proving their identity they can make use of asymmetric cryptography or public-private key cryptography where each of them holds a private key and a public key. The purpose...
by Shermin Voshmgir | Sep 10, 2018
The content of this page has evolved over the years (check wayback machine for previous iterations) and was last updated in July 2019, with an excerpt from the book Token Economy which builds – among others – on the educational blogposts that have been...
by Valentin | Dec 11, 2017
The content of this page has evolved over the years (check wayback machine for previous iterations) and was last updated in July 2019, with an excerpt from the book Token Economy which builds – among others – on the educational blogposts that have been...