Explore tweets tagged as #hashing
@memoizedk
memo
12 days
the three terms encoding, encryption and hashing sounds pretty similar but they are used for completely different purposes. Encoding it is not about security at all. encoding is simply data representation, changing data from one format to another so that it can be easily
22
18
143
@OMPRAKASHROUT19
omprakashor(❖,❖)
2 days
Beginner to Expert Roadmap Step 1: Learn the basics ➺ Start with how blockchains work. ➺ Learn accounts, transactions, gas and the basics of Solidity. ➺ Build and deploy small contracts until the workflow feels natural. Step 2: Understand basic cryptography ➺ Learn hashing
3
0
9
@ennycodes
𝕯𝖊𝖛𝕰𝖓𝖓𝖞 ⍟
16 days
Which one is better for password hashing? 🤔. Personally, I think argon2 is better.
118
13
409
@StellarNews007
Stellar Rippler🚀
4 days
(7/🧵) Bitcoin’s CIA/NSA connection for Mass Surveillance. Many of the earliest Satoshi-era wallets have links straight back to intelligence-backed infrastructure. The fingerprints? CIA/NSA. Bitcoin’s SHA-256 hashing algorithm was designed by the NSA in the 2000s. Was it
1
10
79
@vishal_4743
Vishal Kumar
4 days
The Chainlink community meetup in Bhopal this Wednesday was honestly such a vibe 🔗💙 From breaking down hashing and game theory to laughing over snacks with new frens the whole evening felt like learning + community in the best mix. @bsilagani
1
1
11
@FogHashing
Fog Hashing
3 days
Our Mining Disrupt journey has come to a smooth and successful close. We truly stood out with our hydro cooling solutions — connecting with new clients, and strengthening the partnership with each. A big thank you to @Whatsminer_MBT and RepairBit for co-hosting a fantastic
1
1
14
@httptec2
Shahad
8 days
had such an amazing time at the Encryption and Hashing workshop today by @CCSIT_CS learned so much!! phenomenal work!🤩🤍
0
1
5
@VeneraLabs
Venera Labs
2 days
Over 5000 USDT have been paid out to Venerans Venera Mining consistently ranked higher profits than other CPU mined tokens, #1 in terms of $/watt, thanks to our pool's most efficient allocation of hashing power Join over 1000+ miners on our pool and start earning USDT & VNR
0
0
3
@FogHashing
Fog Hashing
5 days
Mining Disrupt✨We are here waiting for you with the hydro cooling container.
0
5
23
@HarshaChelle
Harsha
11 days
never thought explaining hashing and encryption with a couple of terminal demos over @Zoom for 30 mins would end up saving someone $1.5M in court.
1
1
2
@CincoDoggos
Cinco Doggos Ranch 🧡 ₿ Mining Services
9 days
Lucky miner from @PlebSource arrived in record time! Unboxed and hashing in under 5 mins. 👍 Cool little unit. If you pick one up, tell them Cinco sent ya 😉
1
0
9
@FogHashing
Fog Hashing
15 days
The FogHashing HC40-S1200 continues to see steady daily deployments. Every project is driven by our full passion and expertise.
0
3
31
@kayleecodez
mitali
10 days
was going through some backend stuff and found this thing called consistent hashing ngl half the internet kinda runs on this shit. it decides which server owns your data and somehow keeps it stable even when servers come or go. most basic load balancers (like nginx round robin)
18
17
483
@JonathanHoHAX
Jonathan Ho (CSN3RD)
2 hours
In the late 90s, Rendezvous Hashing was used to select RPs in the MBONE (internet multicast backbone). While the MBONE died, these ideas are still used in multicast today! A few years back, we implemented HRW as the default DR election algorithm for OISM PEGs. Other vendors
@jimfutsu
Jimmy
1 day
after learning about rendezvous hashing it's pretty surprising that consistent hashing is so much more well known it seems like a simpler concept and more general? is consistent hashing just more popular because landmark papers use it instead?
0
1
3
@Alien51GMT
Alien51
10 hours
GN Earthlings ⚡ Rigs stay hashing, alien goes to recharge. Balance in the galaxy. 👽🔋
28
0
28
@FogHashing
Fog Hashing
11 days
Heading to Mining Disrupt next week? We’ll be there at Booth #369 — let’s meet up and make it a great one together!
1
1
8
@DerechodelaRed
Derecho de la Red
16 hours
PDF Object Hashing y Dangerzone: herramientas para abrir documentos de forma segura (para analistas y usuarios/periodistas) https://t.co/rQrNJdM6FA
0
24
64
@joshj100x
Juice
15 days
Qubitcoin $QTC takes a mixed approach merging cryptographic hash functions with quantum computing circuits. As a part of the cycle, miners have to complete a quantum task, check the outcomes, and then use these results in the following hashing step. This setup makes sure the
1
15
44
@cirospaciari
Ciro Spaciari 🇧🇷🇺🇸
15 days
Bun.password makes hashing and verifying passwords simple and secure. The algorithm used to create the hash is stored in the hash itself. When using bcrypt, the returned hash is encoded in Modular Crypt Format for compatibility with most existing bcrypt implementations; with
4
10
280