Alternative Uses for Blockchain – Computerphile

Blockchain has a controversial reputation, linked as it is to cryptocurrency but Professor Peter McBurney of Kings College London thinks it’s an important an invention as the web itself. This video was... Read more »

SHA: Secure Hashing Algorithm – Computerphile

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings. EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg http://www.facebook.com/computerphile https://twitter.com/computer_phile This video... Read more »

Hashing Algorithms and Security – Computerphile

Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out. More from Tom Scott:... Read more »