BlogHide Reblurtskayblue in blurt-192372 • 9 days agoNon-Interactive Zero-Knowledge Signature and How It Secures the BlockchainSource INTRODUCTION Non-Interactive Zero-Knowledge Signatures (NIZKs) are an advanced cryptographic method considering a one-way authenticated user who has to satisfy the conditions given by…kayblue in blurt-1845409 • 17 days agoA friendly football matchGreetings Blurtarians Few days ago when I recently joined a particular departmental WhatsApp group, the guys in the department said they will be playing football match with another department.…kayblue in blurt-188398 • 18 days agoA drawing of a Gooseberry fruitGood day Hivians, I have come today to present a very wonderful drawing of mine here in this platform. Recently i have been drawing alot and i like that. Materials needed My materials for this…reblurtedtammanna in blurt-188398 • 19 days agoA beautiful natural landscape image."Bismillahir Rahmanir Raheem" Assalamualaikum Everyone. This is @tammanna from #Bangladesh. I took this picture with oppo 11 pro mobile How are you all friends? I…kayblue in blurt-192372 • 19 days agoThe Intersection Of IOT(Internet Of Things) And BlockchainSource The Internet of Things can simply be defined as a network or system of physical devices that are basically built, designed and embedded with certain sensory programs and algorithms…kayblue in blurt-1845409 • 22 days agoThe Role Of Blockchain In Supply Chain TraceabilitySource Supply chain can basically be defined as the network of processes, individuals, stakeholders who and which are involved in the transportation and supply of goods, products and services…kayblue in blurt-188398 • 23 days agoBlockchain Reorganization Attack And It's Effect On The Blockchain NetworkSource Blockchain reorganization attack Is one of the great vulnerabilities in Blockchain network. This attacks occurs when the blockchain undergoes a reorganization. Here a new chain of block…kayblue in blurt-192372 • 24 days agoStealth Address Attack And It's Effect On The Blockchain NetworkSource A stealth address is unique one time address , that’s created for making transactions , to make it difficult to trace transactions to the individuals that made them. This concept was…kayblue in blurt-1845409 • 26 days agoCryptocurrency Wallet Security Best PracticesSource Cryptocurrencies is a type of money or valuables, it is a digital asset and as humans and because of risks and threats the wise thing we do is to protect our valuables either by locking…kayblue in blurt-188398 • 27 days agoRisks Associated With Cryptocurrency Arbitrage TradingSource Cryptocurrency arbitrage basically can be said to be the act and the practice of investors or traders buying a token or cryptocurrency on one exchange and selling it on another or a…kayblue in blurt-192372 • 29 days agoThe Basketball CourtRSU Basketball Court Rivers State University (RSU) , is a very popular state university in Nigeria and it has alot of population. A very big school with so many facilities. This school also has…kayblue in blurt-1845409 • last monthThe Role Of Decentralized Storage In Data PrivacySource Today, we live in a digital word , where data privacy have become of great concern for people because of the fact that they religion centralized systems of storing data in servers owned…kayblue in blurt-188398 • last monthDifficulty Bomb Attack And It's Preventive TechniquesSource A difficulty bomb attack is basically one of the many threats tailored or based on the features of the blockchain technology, it imposes significant risks on blockchain networks that…kayblue in blurt-192372 • last monthThe Future Of DAOs (Decentralized Autonomous Organizations)Source Decentralized Autonomous Organization (DAOs) is all about a new innovation in the way organizations are structured. Traditional organizations leadership and decision making are…kayblue in blurt-1845409 • last monthThe Operating Techniques Of Anonymity Signature Scheme On The Blockchain NetworkSource Anonymity signature scheme , which is basically one of the different many cryptographic signature scheme or tools, but unlike these other signature schemes the anonymity signature scheme…kayblue in blurt-188398 • last monthRoll Back Attack And How It Can Be Prevented On The Blockchain NetworkSource Rollback attack is one of the many different types of digital and cryptographic attacks that basically poses a significant security threat and risk to cryptographic protocols and…kayblue in blurt-1787181 • last monthBimodal Cryptographic Signature And It's Major ApplicationsSource The bimodal signature scheme is basically a cryptographic technique or signature algorithm that is basically built and developed based on the combination of two distinct mathematical…kayblue in blurt-192372 • last monthThe ClassroomHello friends How's your day going? The weekend is coming again and am so excited about this. Have been trying my best to do wonderful things in Blurt that will enable my passion in this platform…kayblue in blurt-1845409 • last monthThe Impact Of Blockchain On Financial Inclusion In Developing CountriesSource The issue of financial inclusion in developing countries is a dire one, as millions remain without even the basic financial services available to most. Beyond that, blockchain technology…reblurtedcurationcoconut in blurt-192372 • last month100K Blurt Power Delegation Contest @ Curators Community + Curation Report for @curationcoconut 🥥Hi all you beautiful, benevolent, bold, badass, brave, bright-eyed, brilliant, bubbly, bohemian, blissful, blessed, beguiling, boundless, breathtaking and buoyant BLURTARIANS! 🍀🙏🌞 If you want…