Skip to content

Latest commit

 

History

History
91 lines (67 loc) · 10 KB

security-token.md

File metadata and controls

91 lines (67 loc) · 10 KB

drawing

HTTP is a stateless protocol and is used to transmit data. It enables the communication between the client side and the server side. It was originally established to build a connection between web browsers and web servers.

Majority of software programs require a hardware USB dongle in order to produce correct results. And what if you need to work with such a program in virtual environment where you cannot plug the dongle? There is no full-blown mechanism for connecting USB devices to virtual machine in Hyper-V, so when server is virtualized, all references with USB bus and USB devices connected to it are gone.

Blockchain is evolving into a new phase of our technological society. It is growing exponentially like other life-changing technologies used to, similar to the internet. The different possible ways of making money, presenting projects and bringing new ideas to light every day is what makes the cryptocurrency world so interesting. But let’s focus on a soon very hot topic, security tokens.

It may be hard to believe, but soon you could earn a fraction of Christiano Ronaldo’s earnings. You could own a few square metres of an apartment in Hong Kong or perhaps a stake in a collectible Formula 1 race car. Thanks to tokenization, the world is becoming increasingly fractionalized everyday, providing us with the ability to shape our own financial destiny.

Brickken has built a platform and toolbox that enables businesses to convert their traditional assets onto the Ethereum blockchain.

Historically, companies raise funding through public (stock market, available to all) or private (high-amount investments from accredited investors, called Regulation D) means.

Amy Tom talks to Yevheniia Shmelkova, the Token Specialist at Mysterium Network about crypto exchanges.

Alyze Sam, Adam Alonzi, Patrick Devereux and Koosha Azim term themselves themselves ‘the Stablecoin Group’ as they collectively try to be the unbiased go-to for Stablecoin knowledge, with the help of their communities. Alyze Sam's book, ‘Stablecoin Economy’ was released May 14, 2020. This article is a section from my book that breaks down the top ten stablecoins. Please enjoy this free chapter and consider supporting my work, as I produce a stablecoin to reward children for altruism.  Thank you!

DigiShares was nominated as one of the best startups in Aalborg, Denmark in Startups of The Year hosted by HackerNoon.

Many centralized organizations operate in an old-fashioned way, although they have long lost their credibility. But is there a solution?

Money has evolved alongside societies for over 40,000 years — satisfying basic human needs for a means of exchange, a method of payment, a standard of value, a store of wealth, and a unit of account. This evolution occurred both along traditional trade routes like the Maritime Silk Road, but also more recently along digital trade routes — like the Internet and blockchain.

In this article, we will explore mainly JWT and JWS. In addition, we'll also go through JWE, JWA, and JWK quickly.

Tokenization is a term that's constantly thrown around but the different standards that exist may not be as well understood. These are the basic standards.

JWT is the abbreviation of JSON Web Tokens. JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

What are ENV files and why as an industry should we move away from them?Three months ago we stopped using ENV files.

What’s more impressive to your investors...a $10B AUM fund with $50M of AUM per Full-Time Employee (FTE), or $500M of AUM per FTE?

What's Stopping Cryptocurrency From Achieving Mainstream Adoption? The COVID-19 pandemic and the lockdown have increased the demand for cryptocurrencies/

Or how to stop leakage of your keys once and for all

There seems to be a lot of misinformation on when OAuth 2.0 (henceforth referred to as OAuth) is appropriate for use. A lot of developers confuse OAuth with web session management and hence end up using the wrong protocol / set of technologies. This, in turn, leads to security issues. This article will clarify when to use regular session management solutions and when to use any one of the OAuth flows.

Authentication and authorization for modern web and mobile applications are a key part of most development cycles. This story outlines some considerations.

Recently, in some Blockhain projects born mostly by the brand new teams from around the world that are going to make an ICO, it has become very fashionable to show up or rather be brazenly proud that their project token easily and freely pass such a terrible and hated by everyone - The Howey Test.