Seth Juarez's 'Inside Coco Framework, the Foundation of Blockchain for Enterprise with , Mark Russinovich' →
Another well crafted video explaining the Coco Framwwork and Blockchain componentry from Seth Juarez and Mark Russinovich.
Another well crafted video explaining the Coco Framwwork and Blockchain componentry from Seth Juarez and Mark Russinovich.
Very well crafted, well presented and on target video, comprising blockchain content from Seth Juarez and Mark Russinovich. Deemed today's Must View video. Enjoy (and consider having your parents, grandparents and most of all your kids watch as well).
via Mohit Kumar's superlative reporting at THN, comes word of the successful crack of the GPG Libgcrypt (utilizing a flaw within the lib), now noted as CVE-2017-7526; an additional annoucement has been published at the GPG site.
Roland Pease - writing for the BBC Radio Science Unit, has crafted this well-reported piece, targeting the PRC's Micius satellite, engineered to provision the fundamentals of an ostensibly 'unbreakable' crypto-mehodology, i.e., quantum entanglement (in this case, wierding twins)...
"Chinese scientists have pulled off a major feat with one of the sub-atomic world's weirdest phenomena: photons that behave like twins and experience the same things simultaneously, even over great distances." - via Phys.org
Catalin Cimpanu writing at Bleeping Computer, regales us with the tale of Antbleed, a newly discovered tidbit of backdoor code found on Bitcoin mining devices. Oops.
Screed of the Week, via Aeon, discussing the hard fork of Ethereum, and the Fall of Trust (at least in cryptocurrency). Certainly today's MustRead.
Behold, Yale University Press has published a modern facsimile replication of the Voynich Manuscript. H/T
Eric Miller has created a new project visualizing the cryptocurrency otherwise-known-as Bitcoin's Blockchain utilization in near realtime. Examine Eric's project ReadMe and code repository at GitHub, for additional - and vital - information. Outstanding, indeed.
Via Richard Chirgwin writing at El Reg, detailing the efforts by NIST (here's the project page)(and their private industry partner Cisco) to automate cryptographic validation.
Anti-espionage bombast? Nothing more than diatribe-like vaporware? You be the judge...
Newly revealed discovery of coil whine exploitation, targeting the harvesting of cryptographic artifacts (in this case, keys) via wireless connectivity. More here.
Well wrought thought piece on the use, and misuse, of prepaid cellular telephony hardware, the so-call Burner, and the effort to enforce regulations thereto. Entitled Burner Phones: Will Tightening Restrictions on Prepaid Cell Phones Solve Anything? Certainly today's Must Read post...