In this module we talk Quantum Computing, AI and CBDCs with special guests.
ZeroPoint – Module 11
In this module we have guest host TheObjectiveAlpha, discussing the history of money, stablecoins, DERO, the fiat system, economics and more.
ZeroPoint – Module 10
In this module we have the NotoriousJoshyB, TheObjectiveAlpha, Azylem and Kryptoid. Discussing the future of DERO, the DERO Foundation, projects and more.
BLOG: Engram Wallet Beta – TheOA
On December 24, 2023 the official Engram wallet Beta 0.5.0 was released, with major upgrades from the Alpha release, from Gnomon support to UI tweaks. Let’s have a look at this wallet and see if we can explain why it is so unique in how it empowers the autonomy of private individuals using $DERO unlike any other blockchain.
ZeroPoint – Module 6
An open discussion about blockchain, privacy, technology, freedom and the future!
This episode hosted by secretnamebasis
ZeroPoint – Module 5
This episode is the “Nonsensus Consensus” with a few of the people that attended Nonsensus, they are sharing their thoughts and experiences about the 2023 main event.
Hosted by various Nonsensus 2023 attendees.
BLOG: My thoughts on Nonsensus – TheOA
When I think about Nonsensus and the message it portrays, one phrase comes up:
“Grassroots”
ZeroPoint – Module 2
Members of the European DERO community discuss various points of DERO technology, privacy technologies and the need for decentralization of blockchain technologies.
This week hosted by Little Duck
BLOG: What is DERO? – TheOA
DERO is a general purpose platform for building unstoppable decentralised applications and securely storing and transferring value. It is an original protocol which has been built from scratch and is maintained by the developer team who created it. This is not a fork or translation of any other layer 1 (L1) blockchain protocol.
BLOG: Dero Homomorphic Encryption v Trusted Execution Environment (TEE) for Privacy in Blockchain – TheOA
Trusted Execution Environment is a method like Homomorphic Encryption, to perform operations on data in a form of encrypted state, this form is quite different though. TEE’s work by taking in encrypted data and decrypting it into an encrypted trusted area (called an enclave with Intel SGX) where operations can be performed on the data behind encryption for privacy. The trust in this setup comes from having the data in a decrypted state and having to rely on the surrounding “enclave” to be secure. If you did not create this area, if it is proprietary, then you are trusting it is secure.