xx.network (@xx_network) 's Twitter Profile
xx.network

@xx_network

Fast, full-stack, linear scalable, quantum-ready on the world's most private comms network.

t.me/xxnetwork
linktr.ee/xxNetwork

ID: 1159594007963455488

linkhttp://xx.network calendar_today08-08-2019 22:35:30

2,2K Tweet

58,58K Takipçi

128 Takip Edilen

xx.network (@xx_network) 's Twitter Profile Photo

China has launched a national cyber ID system. 🪪 "Online users have expressed concerns about privacy and censorship." 👁️ "The system aims to "protect citizens' identity information security," according to regulations effective Tuesday, supported by the Ministry of Public

China has launched a national cyber ID system. 🪪

"Online users have expressed concerns about privacy and censorship." 👁️

"The system aims to "protect citizens' identity information security," according to regulations effective Tuesday, supported by the Ministry of Public
xx.network (@xx_network) 's Twitter Profile Photo

The World Economic Forum's paper, "Quantum Technologies: Key Strategies and Opportunities for Financial Services Leaders," recommends financial institutions adopt a phased approach to integrate post-quantum encryption through pilot projects, scaling successful use cases, and

The World Economic Forum's paper, "Quantum Technologies: Key Strategies and Opportunities for Financial Services Leaders," recommends financial institutions adopt a phased approach to integrate post-quantum encryption through pilot projects, scaling successful use cases, and
Don 🥷 (@donsmartzyy) 's Twitter Profile Photo

There’s a silent tech war happening in Web3, and most people don’t even know this. Behind the scenes, there’s a war between Quantum Computers and Blockchain. If we don’t prepare, crypto as we know it might be in danger. Let me show you what’s really going on. 🧵🔻

There’s a silent tech war happening in Web3, and most people don’t even know this.

Behind the scenes, there’s a war between Quantum Computers and Blockchain.

If we don’t prepare, crypto as we know it might be in danger.

Let me show you what’s really going on. 🧵🔻
Don 🥷 (@donsmartzyy) 's Twitter Profile Photo

Are there any solutions? Yes, luckily, some projects are already building quantum-resistant cryptography. That means: even if quantum computers become a thing, they won’t be easy to hack. Here are a few examples: → QANplatformQRL: The Quantum Resistant Ledgerxx.network

Are there any solutions?

Yes, luckily, some projects are already building quantum-resistant cryptography.

That means: even if quantum computers become a thing, they won’t be easy to hack.

Here are a few examples:

→ <a href="/QANplatform/">QANplatform</a>
→ <a href="/QRLedger/">QRL: The Quantum Resistant Ledger</a>
→ <a href="/xx_network/">xx.network</a>
Web3 Foundation (@web3foundation) 's Twitter Profile Photo

Today agenda for ZK Kusama Day at Web3 Summit: 11:00 AM - 11:30 AM Session Opening : Bill and Syed ​11:30 AM - 12:15 PM Session 1: Rick Carback - Doing ZK Without the ZK ​12:15 PM - 1:15 PM Lunch (1 hour) ​1:15 PM - 2:00 PM Session 2: Alessandro de Carli - ZK vs TEE: Who Keeps

Today agenda for ZK Kusama Day at Web3 Summit:
11:00 AM - 11:30 AM Session Opening : Bill and Syed
​11:30 AM - 12:15 PM Session 1: Rick Carback - Doing ZK Without the ZK
​12:15 PM - 1:15 PM Lunch (1 hour)
​1:15 PM - 2:00 PM Session 2: Alessandro de Carli - ZK vs TEE: Who Keeps
xx.network (@xx_network) 's Twitter Profile Photo

Thrilled to join Web3 Foundation's event! Thanks for the invite. 🤝 We are excited to connect with @KusamaNetwork and the community. 🔗 Berlin = Cypherpunk

xx.network (@xx_network) 's Twitter Profile Photo

U.S. lawmakers are working to stop a CBDC due to privacy concerns. They should consider Switzerland's Project Tourbillon, which uses cMixx technology for a scalable, KYC-compliant, privacy-focused CBDC. bis.org/publ/othp80.htm

xx.network (@xx_network) 's Twitter Profile Photo

The quantum supremacy race heats up while nations invest into quantum, pushing decentralized protocols to upgrade encryption. The xx Network is ahead of the curve. Track progress at quantumdoomclock.com

xx.network (@xx_network) 's Twitter Profile Photo

Corporations will grow tired of facing civil suits over privacy concerns. Outsourcing privacy to professionals is the solution. 💡 Meta, our door is always open. 🚪 therecord.media/german-court-m…

xx.network (@xx_network) 's Twitter Profile Photo

Tech companies face pressure to add backdoors. Law enforcement seeks broad surveillance to catch criminals, risking privacy and security. The greatest quantum threat may be government spying on you. Decentralized messaging is crucial. Try: haven.xx.network

xx.network (@xx_network) 's Twitter Profile Photo

Brian Armstrong recognizes the quantum threat. Coins switching wallets or decrypting messages. The xx Network has prioritized these issues from the start, and now the crypto space is waking up. 🫒 Stay private and secure: hub.xx.network Brian Armstrong

xx.network (@xx_network) 's Twitter Profile Photo

Privacy is under attack, and the xx Network's cMixx is a scalable public utility. Keep your messages safe or use cMixx to protect data privacy. Learn more or test cutting-edge decentralized privacy technology at hub.xx.network.

xx.network (@xx_network) 's Twitter Profile Photo

Privacy Podcast - Quantum Investment, Quip, UK Privacy Concerns, Medical Transparency, Cross Agency Privacy and much more! x.com/i/broadcasts/1…

xx.network (@xx_network) 's Twitter Profile Photo

If privacy is outlawed, only outlaws will have privacy. - Philip Zimmermann 🤫 Privacy as protected speech benefits all. 🔗 Plug your dApp into cMixx for next level privacy. Learn More: xx.network or try our dApps hub.xx.network

xx.network (@xx_network) 's Twitter Profile Photo

Protecting your privacy is crucial! Learn how mixnets like cMixx unlink senders and receivers, shielding data from tracking. Use cMixx for dApps or Haven for messaging. You may have nothing to hide, but General Hayden is looking for an excuse! /s Learn more:

xx.network (@xx_network) 's Twitter Profile Photo

In the '90s, traveling with encryption on a floppy disk was illegal, but legal in a book. History doesn't repeat, but it rhymes.

In the '90s, traveling with encryption on a floppy disk was illegal, but legal in a book. History doesn't repeat, but it rhymes.