Cryptography: Difference between revisions
| Line 6: | Line 6: | ||
* [[Cryptocurrency|Cryptocurrencies]] use proof of work (PoW) to achieve trust. | * [[Cryptocurrency|Cryptocurrencies]] use proof of work (PoW) to achieve trust. | ||
* Trusted certificates create secure connections to a server via the Internet. | * Trusted certificates create secure connections to a server via the Internet. | ||
* [[Trusted | * [[Trusted Notifier]]s | ||
==Keys== | ==Keys== | ||