Questions on: security - страница 5

Last updated by at May. 1. Which communication tool allows real-time collaboration? wiki e-mail weblog instant messaging* 2
Google has been awarded a U. S. patent for its floating data centers that are powered by waves and cooled by sea water
thank you for your replies! how likely is it that two addresses will be used for a transaction? That varies on the situation. If I have a dozen addresses with funds on them in my wallet, let's say with 2. 0 BTC received to each address
I have been violated. It is a sobering experience. Username, email, hashed password available on the Internet in a prime database for Lulzsec et al
If there are to be people that only mine Bitcoins for living, mining has to be profitable. However, it needn't be only profitable through transaction fees and block rewards. People could subsidize the miners if needed be
A government that shuts down its Internet to civilians is a government in crisis The economic cost of shutting down all government regulated Internet connections within a developed country is enornmous. It is extremely unlikely that a first or second
If one of the cryptographic building blocks of Bitcoin were to be broken This is a difficult question to answer because Bitcoin uses so many. This is Bitcoin's main hashing algorithm. It uses it for proof-of-work, building merkle trees, and lots of o
The Bitcoin Key app (discussed here) takes the place of rolling dice when creating offline private keys. This is a tutorial of how to use it to create your offline keys. The process is a bit involved, whether you use dice or the app
From Nathaniel Popper's “Digital Gold : Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money", this heavily edited (by me, for clarity) excerpt: “In late July Gavin and Satoshi got an e-mail from . .
There are also several far smaller exchanges still trading. .