Geeq out on this topic
Host Mike Reyes and Geeq’s Stephanie So sat down to discuss ransomware in health care, compliance, and the major data question: to share or not to share.
April highlights: encryption upgrade, chain state view for chain hash proofs.
February highlights: Ed25519 encryption, core validation frameworks complete & updates on NFT + Demos.
The process of using cryptography to transform data, information, or messages into a form that is unintelligible without the encryption key, even if a viewer is able to see the transformed message in plain sight.
Happy New Year, Geeqs! Let’s start the year off with an entry level explainer of the encryption underlying public and private keys. Knowledge is power.
Greetings friends, we know you’ve been asking for another Geeqy update!
Geeq © 2024