2 Comments

Nice one. Enjoyed reading the post. Also I just asked a question to myself about cryptographic property like is it possible for any quantum computing strategy to crack the hashed version of the information as it can deal with such exponential problems however it is secure.

Waiting for part2.

Expand full comment