See Also
2013 Bitcoin and Altcoin Hacks [Part 5]
This article is part of our complete guide to Bitcoin and altcoin hacks. Here we cover Bitcoin and altcoin security incidents from the year 2013. Dogewallet Such hack. Many coin. Very disappear. Christmas of 2013 wasn’t a good time for Dogecoin investors. The recently created half-joke-half-serious cryptocurrency had just suffered its first major heist. Although […]
Proof of Location (PoL) Summary [Cryptocurrency consensus mechanisms]
In a Proof of Location consensus algorithm, users’ geospatial coordinates are accounted for as proof of value. This kind of algorithm is usually employed in cryptocurrency geomining systems. In a geomining application, users earn rewards for being at a certain place at a certain time. If, for example, a company wished to gather participants for […]
ELI5 Cryptocurrency airdrops and giveaways : Why do cryptos get distributed for free?
There’s no such a thing as free lunch. The famous quote, which probably originated at a saloon in the middle of nowhere, raises a valid question about cryptocurrency airdrops and giveaways. You log into Twitter and, if you follow some of the most popular accounts, then you’ve probably seen something like this: $30 #Bitcoin giveaway […]
Proof of Trust (PoT) Summary [Cryptocurrency consensus mechanisms]
In a Proof of Trust system, users in a network gain trust as they participate in special activities within the network. If a user tries to defraud the system, the trust is lost and they lose an equivalent amount in value (the cryptocurrency or token employed). In a Proof of Trust system, “trust” is staked […]