About Supply Chain Attacks

Supply chain attacks are an interesting method of compromising a computer system, but how do they work? Tom Explains. Featuring Tom Merritt. MP3 Please SUBSCRIBE HERE. A special thanks to all our supporters–without you, none of this would be possible. Thanks to Kevin MacLeod of Incompetech.com for the theme music. Thanks to Garrett Weinzierl forContinue reading “About Supply Chain Attacks”

About Proof of Stake

Tom clears up the confusion in Ethereum’s new method of verifying its blockchain and explains the different approaches blockchains utilize. Featuring Tom Merritt. Episodes mentioned: About Blockchain MP3 Please SUBSCRIBE HERE. A special thanks to all our supporters–without you, none of this would be possible. Thanks to Kevin MacLeod of Incompetech.com for the theme music.Continue reading “About Proof of Stake”