The five consensus algorithms #5: Virtual-voting by Dr. Leemon Baird

The five consensus algorithms #5: Virtual-voting by Dr. Leemon Baird

Will EOS Be the End of Ethereum?!?! 10 Facts About EOS

Hey guys, I’m Angelo & welcome back to Crypto Coin Consultants. EOS has been a heavy contender in the crypto ring, backed by groundbreaking technology that’s caused its market cap to pump to over $15 billion at the time of…

Should YOU Invest in Bitcoin?

Should YOU Invest in Bitcoin?

Welcome, welcome to One Minute Crypto! I’m your host, Chronos, and today I will answer that age-old question: should you invest in bitcoin? I get asked this all the time, because when people hear I run a YouTube channel on…

Mining Bitcoin with Excel

Mining Bitcoin with Excel

hello over the next few minutes we’re going to provide a detailed explanation for how the algorithm behind Bitcoin mining works We’ll show you where to find the information that goes into the hashing algorithm and walk you through a…

How Can a Blockchain Be a Monetary System? | DASH School #3

How Can a Blockchain Be a Monetary System? | DASH School #3

Hello, and welcome back to Dash School, Padawan, I am your teacher, Amanda B Johnson and as a quick recap, what we’ve discussed thus far is in our hypothetical digital ledger of e-Money or hey, our blockchain, the “who” gets…

How Does a Blockchain Work? | DASH School #2

How Does a Blockchain Work? | DASH School #2

Hello and welcome back to Dash School I am your teacher, Amanda B Johnson And as you’ll recall, we last left off talking about the digital ledger that is called a blockchain and how it is used to record changes…

Cryptography: The Science of Making and Breaking Codes

Cryptography: The Science of Making and Breaking Codes

This probably looks like gibberish to you, and it should because it’s a cryptogram, a message in code. But, if I told you that all I did was shift every letter in the sentence to the next one in the…

Asymmetric encryption – Simply explained

Asymmetric encryption – Simply explained

Encryption is the process of taking a message and scrambling it’s contents so that only certain people can look at your message. There are two types of encryption: symmetric and asymmetric encryption. Let’s first take a look at symmetric encryption…