Blockchain governance - Part 7
Reducing trusted third parties from digital money to e-voting: Conclusions
You have JavaScript disabled. We tried to make sure the basics of our website work but some functionality will be missing.
Reducing trusted third parties from digital money to e-voting: Conclusions
Reducing trusted third parties from digital money to e-voting: Testing governance hypotheses
Reducing trusted third parties from digital money to e-voting: Assessing blockchain governance
Reducing trusted third parties from digital money to e-voting: Decred Project
Reducing trusted third parties from digital money to e-voting: Basic architecture types
Reducing trusted third parties from digital money to e-voting - The tech behind digital money
Reducing trusted third parties from digital money to e-voting - The case for cryptocurrencies
Even without deep diving into macroeconomic aspects, a quick analysis shows the utility of cryptoassets.
By querying dcrdata we can extract information, investigate and understand the value of Decred network.
dcrdata provides a web interface to analyse the content of blocks, transactions and wallet addresses, along with tickets and votes.
A simulation can help visualise the security of PoW+PoS hybrid mining used by Decred Project.
Go is the language used in the Decred Project and is a prerequisite for virtually all source code made available by developers, as well as for some tools onl...
Tor network may be used to connect cryptocurrency networks in countries where the State wants to have strict control over all sorts of money and prosecutes a...
Dcraddrgen is an application written in Go that generates offline addresses (private key, seed) without having to run the wallet itself (Decrediton or dcrwal...
Portknocking is a technique used to hide the existence of a service running on a server.
Tails is an operating system based on Debian Linux that can be run directly from a USB flash drive. It aims at preserving your privacy and anonymity.
The verification of digital signatures ensures that a message wasn’t altered and that the sender is the one who ‘signed’ the message, the owner of the key pa...
The verification of digital signatures ensures that a message wasn’t altered and that the sender is the one who ‘signed’ the message, the owner of the key pa...
The downloaded copy of the operating system must also have its digital signature verified before installation on a new host or virtual machine.
A script that downloads packages and verifies the digital signature and hashes of Decred packages.
A script that downloads the image and verifies the digital signature and hashes of Debian Linux.
A script that downloads the package and verifies the digital signature of Electrum wallet.
Sharing a dcrd with other devices is useful for those who intend to use a blockchain server on the local network so that the blockchain will be copied from t...
Electrum is one of most used wallets for Bitcoin. But before installing any software we should always verify its digital signature, if available.
Decred components use X509v3 digital certificates for identity validation and to encrypt the communication between them (end-to-end).
There are a few ways to obtain Decred, from buying to mining. Learn here the steps for those who want to exchange Bitcoin or fiat currency for Decred the eas...
Linux services can be configured to self-heal through init systems, or service managers. Service managers start, restart, and terminate services according to...
dcrd is a full node implementation of a Decred network blockchain server written in Go.
The deletion of a wallet can be done manually ou using Decrediton. dcrwallet doesn’t have any option for wallet deletion or replacement.
Decrediton is the official Decred graphical wallet. It is open source, developed by the Decred developers team and is available for Mac, Linux and Windows.
Decred is a cryptoasset that uses its own blockchain, all of its code is open source, and its protocol has a lot in common with Bitcoin’s. Decred was designe...
The table containing a forecast of DCR subsidy until the end of issuance of new DCRs.
To have a better understanding of what it is and how a blockchain works, one must know a few things about cryptography. Hashes, cryptographic key pairs and d...
To understand how Decred works and make the most of it, you need to understand the types of networks, components, connections and addresses.
This article discusses security controls that reduce the risk of unauthorized access or misuse, information leakage and unauthorized physical access, mostly.