Description

Omer Batan Founder of Dash Embassy Turkey

See More See Less

Subscribe

Leave us a review, comment or subscribe!

Meet the hosts

discussions

  • [ lifted from their website. ]   When We Started Eris Industries, We Asked Two Questions 1) Is it possible to build applications which have the benefits of interconnectedness, but without servers? It is. Distributed applications can perform the same functions of modern web applications by enlisting users to participate in the management and security of these applications’ data. 2) Is it possible to create data-driven interactions which are both autonomous and legally compliant? It is. Data-driven interactions are not exempt from legal norms and procedures, and platforms capable of operating within existing legal frameworks will be profoundly useful to businesses and individuals alike. With Eris Industries’ open-source Distributed Application Software Stack, developers can rapidly design, test, and deploy distributed applications which are as flexible, user-friendly, and legally compliant as they are secure. Think of us as the node.js of peer-to-peer technology. What will you build on the Eris Stack?

    Jump to Discussion Post 3 replies
  • We all know about cryptocurrencies and the attention around has increased due to Facebook’s involvement with it. Due to such attention, many people are looking forward to being potential investors in the future and enter the crypto world. We all are aware of the cryptocurrencies being untraceable and shrouded in anonymity, for whatever reasons that attract us to this attribute of cryptocurrency. While many crypto pundits and aficionados are aware of the basic security of cryptocurrency, a large chunk of the market have no clue how crypto works. So, here are the basic principles of cryptocurrency explained. There are three main components of crypto security which are Asymmetric Cryptography, Hashing, and Digital Signatures. They are explained as follows – Asymmetric Cryptography – A Basic Lock and Key Mechanism Asymmetric cryptography is always concerned with two keys, a public key, and a private key and they both act as a lock and key for each other. If a message containing information is encrypted with a private key, it can only be decrypted by a public key and vice versa. This acts as the backbone of many cryptographic schemes such as SSL and TLS including many cryptocurrencies that follow this simple mechanism. A piece of information that can be put out there in the world using a public key and that piece must be guarded using the private key. Hashing – A Unique Code For Everything Hashing, in simple words, is encrypting a message or piece of information into a code called hash. The hash of the message is calculated using the information that the message contains. The hash is always determined using an algorithm. The input of the algorithm is directly dependant on the data of the arbitrary length. The output of the calculated hash is always predetermined and remains the same for the same algorithm elsewhere. This means that the same input will give out the same data every time. While it is easy to convert a message to a hash, but it is difficult to know the content of the original message using the hash. This is because for a small change the hash entirely. For example, the change of a word in a message or even capitalization of a letter can lead to the generation of a new hash. Digital Signatures – The Enforcement Tool Digital Signature is a combination of both Hashing and Asymmetric Cryptography. The sole purpose of Digital Signature is to enforce nonrepudiation and confirm the integrity of a message. The integrity lets you state that the piece of information that you create is the same as the information sent. Non-repudiation lets you state that the message you create can only be created by you and no one else. In simple words, Digital Signatures act like the protection of intellectual property (trademarks, copyrights) for cryptocurrencies and blockchains. While these are an effective way to claim protection, they aren’t going to encrypt anything on its own. A digital signature doesn’t keep messages secret, for that hashing is used. News Source: TheCoinRepublic

    Jump to Discussion Post 0 replies
  • This company is basically a full reserved bank that would be fully approved by Murray Rothbard himself. Their metals broker-dealer business is their cash cow today but they are creating a payment network that disintermediates banks and saves their customers money. They have a crypto broker-dealer and storage business as well but as prudent financial advisors the company’s management tries to educate the public about the virtues of gold ownership. The company acts like a fiduciary and seems much more trustworthy than market leaders like coinbase. Expanding into China with a customary 50/50 JV with a local company. Tough to predict the companies FCF going forward but it trades under 2x book value. Let me know what you guys think.

    Jump to Discussion Post 0 replies
  • As a part of ‘Operation Crypto-Sweep’, the Alabama Securities Commission (ASC) has issued five Cease and Desist Orders to protect Alabamians. The operation is led by NASAA focusing on blockchain startups and ICO projects suspecting violations and fraudulent activities on securities laws. NASAA (North American Securities Administrators Association, the voluntary organization in which ASC is also a member. It is coordinated with ‘Operation Crypto Sweep’. Recently, ASC has taken enforcement actions by issuing five Cease and Desistorders to protect Alabamians. Source of info coinpedia.org

    Jump to Discussion Post 0 replies
  • Greetings all. Does anyone use Coinbase for their wallet/trading? If so, are you happy with them?

    Jump to Discussion Post 8 replies