Tagged articles:


The Byzantine Generals Problem

Learn how the ancient “Byzantine Generals Problem” is applied to the cutting-edge technology of decentralized blockchains.

Cryptographic hash functions I Different size inputs result in fixed length output
10 Dec 2018
Knowledge Base

Blockchain 101 | Part 2: “FCD3 6880 ADD7 FB45?” or “What the Hell Are Hash Functions?”

Cryptographic hash functions represent the basis for the Blockchain technology. Here's a simple explanation of how they work.



While blockchains seem fairly secure, there are nonetheless some events that can bring the new technology down to its knees. Among these, the greatest threat is the 51% attack. Watch Timotej Bodlaj (Portfolio Manager at Solidum Capital) explain it in a simple way.

Want to become a better crypto investor?

Subscribe to our newsletter and stay up to date with regular crypto news and insights.

Only relevant news and updates, no spam.

See what we send

Newsletter signup