Inside the Internet Computer | Chain Key Cryptography

  Рет қаралды 9,876

DFINITY

DFINITY

Күн бұрын

Chain Key cryptography is one of the fundamental breakthroughs enabling the Internet Computer to scale to millions of nodes. The most notable innovation of Chain Key cryptography is that the Internet Computer has a single public key, which enables any device to verify the authenticity of artifacts generated by the Internet Computer, even smart watches and mobile phones.

Пікірлер: 26
@Daniel-xaogjeyh
@Daniel-xaogjeyh 3 жыл бұрын
I wish these talks were more in-depth and more mathematical, in general I find the tech documentation on IC is very high level
@VladKron01
@VladKron01 3 жыл бұрын
Great project. I've been following him since 2017. Top team. Good luck in developing the ecosystem.
@yking8565
@yking8565 9 ай бұрын
What if the NNS gets compromised?
@connorcink3972
@connorcink3972 3 жыл бұрын
So you are leveraging node software as computational power for executing canisters and NNS is an automated centralized orchestration subnet. I'll be the first to implement a canister to talk to Iota's Tangle for Identity verification
@zeeshankarim8833
@zeeshankarim8833 3 жыл бұрын
And How it helps you??
@visq
@visq 2 жыл бұрын
Did you ever get this going?
@connorcink3972
@connorcink3972 2 жыл бұрын
@@visq No. Turned my sights to BTC. Still holding this idea in my back pocket. There is a tremendous need for a better self sovereignty tool.
@visq
@visq 2 жыл бұрын
@@connorcink3972 Well, BTC will be interoperable with ICP; so both of your goals can align. Lol, I have both IOTA and ICP so that's why your comment got my eye.
@lucianoalessandretti8739
@lucianoalessandretti8739 8 ай бұрын
Icp Internet computer is the future easy 100x
@yvonney6732
@yvonney6732 3 жыл бұрын
My understanding is the essence of "security" is trust in the majority-if majority of the nodes agree then this must be true otherwise false/faulty/etc. Questions: 1. What happens if less than required amount of nodes (say 2/3 of nodes) agree with each other. 2. What if my computing is time variant in nature, therefore it can be legit that nodes have different results. 3. If bad nodes are identified, what's the mechanism to remove/deprecate/restrain them. 4. If my understanding stated in the first sentence is correct, are there any use cases this ICP isn't suitable for?
@CarlosRamirez-yk6wv
@CarlosRamirez-yk6wv 8 ай бұрын
Third innovation in block industry
@micmvp9074
@micmvp9074 3 жыл бұрын
Where can I team up with the developers. Thanks.
@yking8565
@yking8565 9 ай бұрын
Doesn't this create a huge overhead? Every computation in this way is done several times. If you would run a program like this, you quickly would run out of resources.
@JacobL479
@JacobL479 Жыл бұрын
Love icp
@patzelife
@patzelife 3 жыл бұрын
👍👍👍👍👍
@channel-jv5nd
@channel-jv5nd 3 жыл бұрын
please subtitles on!!!!)
@rCrypto_Frog4148
@rCrypto_Frog4148 3 жыл бұрын
click "CC" bottom of the video
@JoY-dx1zw
@JoY-dx1zw 3 жыл бұрын
Don't buy the faking scam
@techxteem8010
@techxteem8010 3 жыл бұрын
Did you buy at 300 ?
@tommydabs506
@tommydabs506 3 жыл бұрын
@@techxteem8010 paid for bot to spread fud pay him no mind
@techxteem8010
@techxteem8010 3 жыл бұрын
@@tommydabs506 been averaging down since it hit 50 by putting 20% capital on every drop of 20%
@VladKron01
@VladKron01 3 жыл бұрын
You just need to work at McDonald's and not come into the investment world. You are just an amateur, and the fact that you have become a holder for a while will make you smarter.
@Gapil
@Gapil 2 жыл бұрын
@@techxteem8010 rip
Inside the Internet Computer | Consensus Overview
19:38
DFINITY
Рет қаралды 5 М.
Inside the Internet Computer | Network Nervous System (NNS)
20:53
Blue Food VS Red Food Emoji Mukbang
00:33
MOOMOO STUDIO [무무 스튜디오]
Рет қаралды 33 МЛН
when you have plan B 😂
00:11
Andrey Grechka
Рет қаралды 24 МЛН
Matching Picture Challenge with Alfredo Larin's family! 👍
00:37
BigSchool
Рет қаралды 52 МЛН
What Makes Chain-Key Cryptography So Special
11:12
CityXcape
Рет қаралды 1,4 М.
Introducing Canisters - An Evolution of Smart Contracts
11:12
Titanium | Chain Key Cryptography Overview
12:37
DFINITY
Рет қаралды 1,4 М.
Inside the Internet Computer | Canister Lifecycle
25:36
DFINITY
Рет қаралды 6 М.
Public Key Cryptography - Computerphile
6:20
Computerphile
Рет қаралды 892 М.
eBPF: Unlocking the Kernel [OFFICIAL DOCUMENTARY]
30:00
Speakeasy Productions
Рет қаралды 95 М.
10 Principles for Secure by Design: Baking Security into Your Systems
17:28
ICP Zero to Dapp Educate: The Internet Computer Protocol
1:04:31
Encode Club
Рет қаралды 6 М.
Blue Food VS Red Food Emoji Mukbang
00:33
MOOMOO STUDIO [무무 스튜디오]
Рет қаралды 33 МЛН