Launch App
Launch App

Privacy Showing 14 Articles

Filter
Trading Essentials Technical Analysis Economics Security Tech Blockchain Privacy Cryptography DeFi Altcoin Community Bitcoin NFT Metaverse Personal Finance Web3 Binance Use Cases Ethereum Wallet Consensus Mining Tutorials History
What Is Decentralized Storage?

Powered by blockchain, decentralized storage systems keep data files across geographically distributed nodes connected via P2P networking.

Articles

What Is Decentralized Storage?

2023 Mar 16 7 min
Common Bitcoin Scams and How to Avoid Them

Security is a must in the crypto space. Knowing the most common Bitcoin scams and how to avoid them could save you from losing your bitcoins for good.

Articles

Common Bitcoin Scams and How to Avoid Them

2020 Nov 30 8 min
What Are Cookies?

What is that "accept all cookies?" pop-up really asking you when you open a web page? Learn all you need to know about HTTP cookies at Binance Academy.

Articles

What Are Cookies?

2020 Sep 30 7 min
What is End-to-End Encryption (E2EE)?

End-to-end encryption turbocharges your privacy by ensuring only the intended recipient can decrypt messages you send them. Learn more at Binance Academy.

Articles

What is End-to-End Encryption (E2EE)?

2020 Jul 03 10 min
Coin Mixing and CoinJoins Explained

A range of techniques have emerged to break the link between Bitcoin addresses. Learn more about coin mixing and CoinJoins at Binance Academy.

Articles

Coin Mixing and CoinJoins Explained

2020 Mar 25 6 min
An Introduction to Confidential Transactions

Confidential Transactions are a privacy-enhancing upgrade to cryptocurrency protocols that obfuscate the amounts sent between participants from the network.

Articles

An Introduction to Confidential Transactions

2020 Feb 10 6 min
Device Fingerprinting: How Exposed Are You?

Device Fingerprinting is a powerful technique can be used for both legitimate and shady activities. Understanding their basic mechanisms is essential.

Articles

Device Fingerprinting: How Exposed Are You?

2019 Aug 26 4 min
What Is PGP?

PGP has been an essential tool for data protection and is now used in a wide range of applications, providing privacy, security, and authentication.

Articles

What Is PGP?

2019 May 06 4 min
zk-SNARKs and zk-STARKs Explained

Privacy has always been valuable within the cryptocurrency community. It is the precursor to fungibility, which is necessary for a widely used form of money

Articles

zk-SNARKs and zk-STARKs Explained

2019 Feb 26 6 min
Why Public WiFi Is Insecure

For many people, being able to connect to free internet on the go seems ideal. However, there are more risks to using public WiFi than you may realize.

Articles

Why Public WiFi Is Insecure

2019 Jan 15 5 min
What Is a Dusting Attack?

Have you received a small amount of unsolicited cryptocurrency into your wallet? You may be a victim of a Dusting Attack. Learn about dusting attacks.

Articles

What Is a Dusting Attack?

2018 Nov 28 5 min
What Is Phishing?

Phishing is a type of cyber attack where a malicious actor deceives people to collect their sensitive information. Learn about Phishing on Binance Academy.

Articles

What Is Phishing?

2018 Nov 28 6 min
What Is a Keylogger?

Complete guide to Keyloggers: What they are, how to protect yourself and how to detect and remove Keyloggers.

Articles

What Is a Keylogger?

2018 Nov 28 4 min
General Security Principles

Follow the three main security principles outlined in this article to mitigate some risks associated with holding, using, and trading cryptocurrencies.

Articles

General Security Principles

2018 Nov 28 4 min
<<<1/1>>>