Web 3.0 will be decentralized. Joseph Lubin, Founder and CEO, ConsenSys as well as Co-founder of Ethereum; Dominic Williams, Founder and Chief Scientist at DFINITY; speak with moderator Jen Wieczner, of FORTUNE.
AI and Blockchain
The Founder and CEO of WorkDone Inc., Joseph Rogers, sits down with Security Token Academy’s Adam Chapnick for this expert interview. WorkDone Inc. is bringing AI to the workplace with machine learning-based workforce automation services.
The Art Of Blockchain
By day, Thomas Silkjaer designs bibles. By night, he turns blockchains into art. How do the two inform each other? What can we learn from the traditional and how can we apply it to the new?
Elon Musk’s Neuralink Says It’s Ready for Brain Surgery
Elon Musk speaks about Neuralink, a company he founded in 2017 to develop a data transmission system between people and computers. “This is going to sound pretty weird, but ultimately, we will achieve symbiosis with artificial intelligence,” Musk said at a news conference in San Francisco.
Fight Fake News With Blockchain
As a diplomat in Syria, Mounir Ibrahim witnessed firsthand the power of visual truth through images captured on the smartphone.
Unfortunately, he also noticed that visual truth could be corrupted and altered, and that genuine evidence can be dismissed as fabricated images.
This led him to work for a company that uses the blockchain to authenticate digital images which has recently been awarded by Fast Company as the #1 Most Innovative Company for Social Good.
Mounir Ibrahim spent years working in the State Department in Syria and saw first hand the chaos and political turmoil raging in the country.
His time working in diplomacy made him aware of the prevalence of fake news and the tendencies of people in power to fabricate events.
He now works at Truepic, a company that utilizes cloud computing and blockchain technology to provide photo authentication for a variety of industries, ranging from insurance to government accountability.
Digitex Futures is Becoming a Decentralized Autonomous Organization
Digitex CEO, Adam Todd, explains that Digitex is converting into a DAO and how token holders are being given the exchange for free — and what effects this will have on token price and the longevity of the exchange.
Tokenization of Assets from Race Horses to Whiskey
The Security Token Academy presents an expert interview with Benjamin Tsai, president and managing partner of Wave Financial. The company offers early-stage investment, asset management, and treasury management to further the growth of the digital asset ecosystem. In this interview with Adam Chapnick, Security Token Academy’s director of programming, you’ll learn about tokenization and the tokenization process.
Is This What Quantum Mechanics Looks Like?
Silicone oil droplets provide a physical realization of pilot wave theories.
What is Hashing on the Blockchain?
Hashing is generating a value or values from a string of text using a mathematical function.
Hashing is one way to enable security during the process of message transmission when the message is intended for a particular recipient only. A formula generates the hash, which helps to protect the security of the transmission against tampering.
Cryptographic hashing is a key feature in the security and efficiency of blockchains. If you’ve ever wondered how so much data can be stored securely on every node in the network, hashing is a big part of the answer
Cryptographic Hash Functions
A cryptographic hash function is a special class of hash functions which has various properties making it ideal for cryptography. There are certain properties that a cryptographic hash function needs to have in order to be considered secure. Let’s run through them one by one.
Property 1: Deterministic
This means that no matter how many times you parse through a particular input through a hash function you will always get the same result. This is critical because if you get different hashes every single time it will be impossible to keep track of the input.
Property 2: Quick Computation
The hash function should be capable of returning the hash of an input quickly. If the process isn’t fast enough then the system simply won’t be efficient.
Property 3: Pre-Image Resistance
What pre-image resistance states is that given H(A) it is infeasible to determine A, where A is the input and H(A) is the output hash. Notice the use of the word “infeasible” instead of “impossible”. We already know that it is not impossible to determine the original input from its hash value.
Let’s take an example.
Suppose you are rolling a dice and the output is the hash of the number that comes up from the dice. How will you be able to determine what the original number was? All you have to do is find the hashes of all numbers from 1-6 and compare. Since hash functions are deterministic, the hash of a particular input will always be the same, so you can simply compare the hashes and find out the original input.
But this only works when the given amount of data is low. What happens when you have a huge amount of data? Suppose you are dealing with a 128-bit hash. The only method that you have to find the original input is by using the “brute-force method”. Brute-force method basically means that you have to pick up a random input, hash it and then compare the output with the target hash and repeat until you find a match.
Shining Light Through Solid Balls Using Quantum Mechanics—Poisson’s Spot Experiment
In this video I show you how it is possible to shine light through a sphere using the wave-like nature of light. This spot in the center of the shadow of a sphere is called Poisson’s spot or Arago’s spot. It is a result of the diffraction of light around the edges of the sphere that constructively interfere right at the center. Then I show you what it actually looks like to look at the center of poisson’s spot. Does it look like the light is actually going through the ball?
