Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

Crypto, What Is It Good For? An Overview of Cryptocurrency Use Cases

By World Economic Forum

in Document, Report
1 min read

Over a decade ago, a white paper by Satoshi Nakamoto was distributed to a cryptography mailing list outlining a novel proposal for a “peer to-peer electronic cash system” called bitcoin. This innovation spurred a new, global industry and asset class that has created hundreds of billions of dollars in value, and inspired a generation of entrepreneurs and innovators. The advent of cryptocurrencies has led to the creation and operation of new global, decentralized networks that have been used by over 100 million people across the world to transfer trillions of dollars of value. Bitcoin, for example, is more than just a technology – it is a powerful social, political and cultural movement that asks us to imagine money, banking and payments in new and novel ways. While cryptocurrencies are most often recognized as new monetary systems and financial networks, the public blockchain networks that they secure can be used to power diverse use cases and create new applications across industries. These networks are constantly evolving through an opensource software ecosystem with globally distributed communities that upgrade, maintain and operate them. Innovators, entrepreneurs and engineers are rapidly building and bringing to market new products and solutions that provide access to or leverage these new networks.

READ FULL REPORT

Tags: BitcoinCryptocurrencyCryptocurrency DocumentsReportWorld Economic Forum
7
VIEWS

More Reports

A Look into the Global “Drive-By Cryptocurency Mining” Phenomenon
Report

A Look into the Global “Drive-By Cryptocurency Mining” Phenomenon

April 16, 2021

Differing from traditional money, cryptocurrencies are not issued by a central bank or authority. Instead, this digital asset can be...

THE WHO, WHAT, WHY AND HOW OF DDoS ATTACKS: A GUIDE FOR IT PROS
Report

THE WHO, WHAT, WHY AND HOW OF DDoS ATTACKS: A GUIDE FOR IT PROS

April 15, 2021

The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years.

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
Report

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs

April 14, 2021

A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent methods for outside entities...

MORE

Entertainment

In a lie, the truth will be born

November 30, 2020
Software

Qualys FreeScan

April 15, 2021
CompTIA

Consensus Mechanism Proof of Authority (PoA)

January 8, 2021
Quote

“Paying a ransom doesn’t guarantee an organization that it will get its data back…”

March 27, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.