Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Cybersecurity
Hacking
Darknet
ransomware
drugs
Bitcoin
Vulnerabilities
Posts Tagged ‘DECENT’
Most Recent
 
Read More
October 24, 2016

The Future of Digital Rights Management Might Be Decent with Blockchain

DECENT wants to create a decentralized digital rights management solution for piracy powered by the blockchain.

Like so many modern decentralized platforms, DECENT’s platform seeks to remove the middlemen, power abusers, and prevent third party manipulation to ensure content creators and consumers can trade material in a peer-to-peer, permissioned and transparent blockchain network.

“Our aim is to replace the status quo,” Matej Michalko, DECENT developer, tells Hacked.

A network of individual, digital dictatorships, with a digital democracy, re-routing power back to authors, artist, producers and those [...]

66934
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University