During Christmas week 2018, my wife and I hosted a dinner with friends and family. My sister, sitting next to me, put her glass of warm cider down.
“How secure is my credit card?” she asked me. “Because I think it might have been hacked”
“Assume it’s...
Yes, however, both historical and legal contexts need to be taken into account. Rarely is a change made to the U.S. Bill of Rights. Since its adoption in 1791, “The original document has been changed only seventeen times” (“Digital History,” n.d.). Considering the original Bill...
Blockchain networks are distributed ledgers that stores digital records of transactions on a trustless network. No centralized authority exists in a blockchain ecosystem, and transactions are committed through its consensus protocol. When you hear the term mining, it is those decentralized nodes on a network...
... it begins with an idea.
As Americans we must honor those who came before us and fought to preserve our rights as well as a duty to fight for those whom are yet to be. We fought the British when we could no longer tolerate...
The following is a multi-part article that I will release over the next four weeks on why taking control of your digital identity is imperative.
Through examining the pioneering work kicked off by Satoshi Nakamoto's paper "Bitcoin: A Peer-to-Peer Electronic Cash System," personal identity pioneers can...