In this article, sCrypt showed how to implement Taproot using the original Bitcoin protocol without any changes, by combining contractless...
Bitcoin has a lot of potential uses far beyond payments, and each block has a cryptographically secured timestamp which can...
The filing allows it to sell the stock from time to time in an “at the market” offering to finance...
Bitcoin uses a binary tree structure to collapse a huge set of transactions into an easily searchable path, which is...
The current innovation of ASIC miners to make hashing as powerful as possible while efficient as possible is not accounting...
sCrypt designed a smart contract called “Pay to Decrypt” that makes the exchange atomic and trustless, ensuring only a correct...
In this article, Jerry Chan explores each of the three strategies in scaling Ethereum and why none will achieve the...
sCrypt has implemented elliptic curve arithmetic in Script, where they compute it directly compared to the previous implementation where they...
In the second part of this two-part piece, sCrypt introduces a universal yet straightforward delegation mechanism, an alternative to the...
Researchers from ESET say hackers mimicked popular wallets such as Trust Wallet and Coinbase and embedded a code giving backdoor...
In this two-part piece, sCrypt demonstrates a novel way to allow users to spend their UTXO/coins without giving another party...
RSS or Really Simple Syndication is a pure text feed that allows users to subscribe and see content from their...