Srijon Mahmud Rana pfp

Srijon Mahmud Rana

@ranasrijon

58 Following
26 Followers


Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Relax time
0 reply
0 recast
2 reactions

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
0 reply
0 recast
0 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Avoid it..🙂
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Be Happy🙂
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Silent Killer 11
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Happy New Year 2025❤️
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
0 reply
2 recasts
3 reactions

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
SPL2024
0 reply
1 recast
2 reactions

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
😳
0 reply
1 recast
2 reactions

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Formal definition According to Jan Lansky, a cryptocurrency is a system that meets six conditions:[33] The system does not require a central authority; its state is maintained through distributed consensus. The system keeps an overview of cryptocurrency units and their ownership. The system defines whether new cryptocurrency units can be created. If new cryptocurrency units can be created, the system defines the circumstances of their origin and how to determine the ownership of these new units. Ownership of cryptocurrency units can be proved exclusively cryptographically. The system allows transactions to be performed in which ownership of the cryptographic units is changed. A transaction statement can only be issued by an entity proving the current ownership of these units.
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
2️⃣0️⃣2️⃣5️⃣ Happy New Year
0 reply
0 recast
2 reactions

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
0 reply
0 recast
0 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
https://hey.xyz/posts/0x08354f-0x5e-DA-52d72cf9
0 reply
0 recast
3 reactions

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
GOAT
0 reply
0 recast
0 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
https://hey.xyz/posts/0x03aff3-0x1d-DA-3486a403
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
https://hey.xyz/posts/0x03aff3-0x1d-DA-4fbdd5bf
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
0 reply
0 recast
1 reaction

Srijon Mahmud Rana pfp
Srijon Mahmud Rana
@ranasrijon
Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring extensive testing and reviews, preferably in a public forum. Good algorithms and protocols are required (similarly, good materials are required to construct a strong building), but good system design and implementation is needed as well: "it is possible to build a cryptographically weak system using strong algorithms and protocols" (just like the use of good materials in construction does not guarantee a solid structure). Many real-life systems turn out to be weak when the strong cryptography is not used properly, for example, random nonces are reused[6] A successful attack might not even involve algorithm at all, for example, if the key is generated from a password, guessing a weak password is easy and does not depend on the strength of the cryptographic primitives.[7] A user can become the weakest link in the overall picture, for example, by sharing passwords and hardware tokens with the colleagues
0 reply
0 recast
0 reaction