Unbound Blog

What’s New

Three Ways Authentication Has Evolved Since 1960

An oral history of  authentication: the tech community’s efforts to connect computer operations with the people behind them. When you think “authentication,” what comes to […]

( Read this Post )
What’s New

Hierarchical Deterministic Wallets (BIP032/BIP044) in MPC

In Bitcoin and other cryptocurrencies, the use of hierarchical deterministic wallets (HD wallets) is a widely accepted practice. Loosely speaking, such wallets work by having […]

( Read this Post )
What’s New

What the DP-3T Initiative Means for Privacy

The world is in the grip of a pandemic which has shut down the economies of all countries, imposed restrictions on freedom of movement, and […]

( Read this Post )
What’s New

Why Infrastructure Matters for Secure Digital Asset Custody Services

This is the fourth blog in a series about infrastructure for protecting tokenized assets. To recap: “Do-it-yourself” (DIY) – or in-house, self-built solutions – rely […]

( Read this Post )
What’s New

The Zoom Encryption Debate

Cryptographic experts explain the encryption protocols Zoom uses for its record 220 million users, and what they mean for cybersecurity in the age of work-from-home […]

( Read this Post )
What’s New

Blockchain, The Two-Edged Technology for Decentralized Finance

In honor of Women’s History Month, and #HyperledgerWomen, we interviewed Unbound’s Director of Digital Asset Security & Blockchain, Rebecca Aspler to get her thoughts specifically […]

( Read this Post )
Page 25 of 26« First...10...2223242526