Abandoned Intel Manufacturing Complex Bought for $13M to Mine Bitcoin

Abandoned Intel Manufacturing Complex Bought for $13M to Mine BitcoinFollowing such places as Quebec and New York, the latest location in North America to attract large Bitcoin mining operations with a cheap supply of electricity is Colorado Springs. A miner has paid $13 million to convert an abandoned Intel chip manufacturing complex into an industrial mining farm.    Also Read: Silicon Valley Whales Buy […]

The post Abandoned Intel Manufacturing Complex Bought for $13M to Mine Bitcoin appeared first on Bitcoin News.

Go to Source

Powered by WPeMatico

MIT Media Lab Project Enigma Partners with Intel on Privacy Research

American multinational technology company Intel has partnered with Enigma on research and development of privacy in computational technologies. Announcing the partnership in a blog post, Enigma said that it was excited to work with Intel as it seeks to advance its protocol and privacy technologies for public blockchains. The partnership comes a few weeks before […]

Go to Source

Powered by WPeMatico

First Soros, Now Rockefellers Move into Cryptocurrency

First Soros, Now Rockefellers Move into CryptocurrencyFirst, if reports are to be believed, legendary investor George Soros was found to be investing in cryptocurrency. Now, Venrock, a 3 billion USD venture capital firm owned by storied American family, the Rockefellers, have taken to crypto.  Also read: George Soros Is Rumored to Be Investing in Cryptocurrency First Soros, Now Rockefellers’ $3 Billion Firm […]

The post First Soros, Now Rockefellers Move into Cryptocurrency appeared first on Bitcoin News.

Go to Source

Powered by WPeMatico

How to Secure Decentralized Projects with Hardware Enclaves?

An efficient security solution is mandatory to protect blockchain-based decentralized projects that run on untrusted nodes. iExec will present a solution mixing software and hardware encryption for its decentralized cloud at IBM Think in Las Vegas (19-22 March). Securely Running Applications on Untrusted Nodes A new security trend consists of providing a hardware enclave to run applications in an inaccessible part of the CPU. Even the owner of the CPU isn’t able to access the data processed inside of this enclave. With this cutting-edge technology, it is possible to run applications on a decentralized fashion even on untrusted nodes, because

Go to Source

Powered by WPeMatico