Crypto.BI is 100% AD-FREE + 100% TRACKER-FREE. Download the Brave Browser NOW and join the movement!

11
History and importance of Open Source Software in cryptocurrency development

Open Source plays such an important role in the world of cryptocurrencies, that it is almost forgotten and taken for granted by crypto users. It’s as if the transparency and ...

12
Cryptocurrency bubble: truth or FUD?

What is a financial bubble? Why do cycles of boom/bust happen in the markets? These questions have been asked ever since trade and commerce began happening and the first financial ...

13
What is actually a cryptocurrency fork?

Unless you’ve been living in a cave for the past 9 years, then you’ve probably heard about cryptocurrency forks. Bitcoin Cash was probably the most hyped, feared, loved...

14
Summary of cryptocurrency consensus mechanisms

There are currently two mainstream consensus mechanisms used by cryptocurrencies: proof of work and proof of stake. But ...

15
Who is Gavin Andresen?

As part of the Who’s Who section of Crypto.BI, today we present the profile of Gavin Andresen, one of Bitcoin’s most impor...

16
What is a Metaverse?

A Metaverse is a conceptual virtual world that incorporates ideas from the Internet, augmented reality, virtual reality, artificial intelligence and other state of the art technolo...

17
Understand Complementary Cryptocurrencies

Complementary cryptocurrencies are a concept similar to complementary fiat currencies. They’re not standalone cryptos which hold their own value but, as the name suggests, th...

18
Tether is backed by Bitcoin converted to U$, not by actual US Dollars

A lot of the controversy surrounding the Tether cryptocurrency seems to focus on whether it is fully backed by US Dollar funds or not. Several rele...

19
James Ellis: The British cryptographer who invented public key cryptography before Diffie-Hellman (and kept quiet about it)

When you think of heroic British spies, the image of a math guy in heavy frame glasses working behind a desk piled with math books does not usually come to mind. While the world en...

20
Understand asymmetric AKA public key cryptography

For thousands of years the art of encryption consisted in hiding one secret from the enemy. By gaining access to this secret the opponent could decode the message and, per...

Blog Pages: 234567891011121314151617181920