Unitychain Core Team
Unitychain Core Team

How Blockchain Will Revitalize The Fractured Global Supply Chain

Tractability and Trust

We all know the conventional method goods get processed and shipped across the globe, which is moving a good from a producer to the seller and ultimately arriving at the end user. We call this process the ‘supply chain’. In actuality, this process is in fact not quite a chain at all. Its procedures may […]

A Brief History of Random (In)security

Random Number Generator Hacks and Exploits

Most software and operating systems use random numbers for security processes. And because software is often built with cost and speed in mind, developers tend to use pseudo-random number generators (PRNGs) to create cryptographic keys and other system encryptions. PRNGs are algorithms that use mathematical formulas or precalculated tables to produce sequences of seemingly random […]

Decentralized ID: Bridging Legal and Digital Identities

“It is fair to say that today’s Internet, absent a native identity layer, is based on a patchwork of identity one-offs.” – Kim Cameron, former Architect of Identity at Microsoft The right to identity is a fundamental human right that exists from the moment we are born and lasts for life. This right is recognized […]

Security in Chaos and Entropy

True Random Number Generators

In many systems, “random” numbers are supplied by algorithms called pseudo-random number generators (PRNGs) or deterministic random bit generators (DRBGs). These algorithms generate long sequences of seemingly random bits that are based on a secret initial value called a seed, and other possible inputs [1]. This approach creates the illusion of unpredictability. In practice, however, […]

A Brief History of Random (In)security

Random Number Generator Hacks and Exploits

Most software and operating systems use random numbers for security processes. And because software is often built with cost and speed in mind, developers tend to use pseudo-random number generators (PRNGs) to create cryptographic keys and other system encryptions. PRNGs are algorithms that use mathematical formulas or precalculated tables to produce sequences of seemingly random […]


Previous page Next page