:

Business

My Dinner with [Marc] Andreessen

Billionaires I have known: Part One of a three-part series

Attackers spread backdoor via eScan antivirus software update process

Avast discovered and analyzed GuptiMiner, a malware campaign hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers.

Deliberative Consensus Protocols

Introduction: Scalable Group Decision-Making A deliberative consensus protocol is a process that online groups can use to make decisions. It’s designed to produce good decisions that are fair and manifest the collective intelligence of the group.

My Dinner with [Marc] Andreessen

Billionaires I have known: Part One of a three-part series

The dangers of "decentralized" ID systems

Many decentralized identity protocols are being developed, which claim to increase users’ privacy, enable interoperability and convenient...

Deliberative Consensus Protocols

Introduction: Scalable Group Decision-Making A deliberative consensus protocol is a process that online groups can use to make decisions. It’s designed to produce good decisions that are fair and manifest the collective intelligence of the group.

The dangers of "decentralized" ID systems

Many decentralized identity protocols are being developed, which claim to increase users’ privacy, enable interoperability and convenient...

Bountysource Stole at Least $17,000 from Open Source Developers

This is why people say the open source ecosystem sucks.