wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Bitcoin sent using radio waves! No internet!

profile
vishal singh
Feb 13, 2019
0 Likes
0 Discussions
1563 Reads
The decentralized blockchain keeps amazing us with the endless possibilities and potential that it have under the hood.  Right from the highest hit of BTC/USD people are showing more interest in crypto and want to become a part of this world too. However, regulation is needed to ensure the safety of the stake that a user is putting in the economy. The biggest news is coming from the USA where the bitcoin is sent over radio waves in absence of internet. This was a non-commercial experiment carried out on a 7 Mhz frequency. This ensures the future of both bitcoin and the crypto market. Screen Shot 2019-02-13 at 11.13.03 AM.png More details on the official twitter handle => https://twitter.com/nvk/status/1095354354289135617 Direct link to the transaction happened using radio waves => https://www.blockchain.com/btc/tx/82c043a82770e9129633d2c7259818b404d467fb8cab963773c574857a96202e

Comments ()


Sign in

Read Next

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Install Ubuntu Easily

Blog banner

Different types of scam frauds

Blog banner

Virtual memory

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Cache memory

Blog banner

Excel records

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Music

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

AI and cyber Security

Blog banner

Starting Android Activity Using Intent

Blog banner

Evolution of operating system

Blog banner

Types of threads

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Hash password! Is it really secured?

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Data Structures

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

Paralysis/Paralysis Stroke

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Use case of K-means clustering

Blog banner

Google

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

My Favorite Country

Blog banner

Multicore and Multithreading

Blog banner

IoT Evolution

Blog banner

TRELLO

Blog banner

Modern Operating Systems.

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

memory cache

Blog banner

INTERRUPTS

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Topic: Sessions in Operating system

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Odoo

Blog banner

Cyber Security Control

Blog banner