0 FollowingView All
0 FollowersView All
3 CommentsView All
Posted On hi, 7 Months Ago
cool baby
Posted On hi, 7 Months Ago
nice baby
Posted On Funny joke, 7 Months Ago
ahaha
FOLLOW
ikotaki3
@ikotaki3
i am a Camerounian crypto enthousiastic
Joined 1 Year Ago
0 Posts  •  0 Followers  •  0 Following
Aleks75
FLAG POST
7M AGO

Boomb Man

VID
9 Points
0 Posts
11 Votes
 
2 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Den2872
FLAG POST
7M AGO

New Mining App

πŸ“ŒRead At First
Earn per month $1000 πŸ’΅πŸ’΅
By TimeStope #Free

Same as Pi network Coin
Join with this link below

πŸ“Œ Must visit Every 24 hours

Just launched book you ID First to Earn good 😊

NOTE :- In witness section write :- den2872

No need to email to join
And must save at first your private key πŸ— and public key OK

https://www.timestope.com/den2872
Download Apps
1 Point
0 Posts
1 Votes
 
0 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Den2872
FLAG POST
7M AGO

2800$ Legit Airdrop

πŸš€ UniBlue Finance (UBF) Airdrop πŸš€

πŸ’° Rewards: 400-UBF ($2800)

πŸ”₯Join here:
https://docs.google.com/forms/d/e/1FAIpQLScfbFovida1VUSbbeYFDKB8Z8T78Vf34DU1IPfitDy90AZt0g/viewform?entry.1466678886=@Kalpesh70853932

Twitter and Retweet with Tags 3 Friends

Quiz: Use this link for your Answers HereπŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Answer1.
πŸ‘‡πŸ‘‡πŸ‘‡
Symmetric-key cryptography, Public-key cryptography

Answer2.
πŸ‘‡πŸ‘‡πŸ‘‡
Confidentiality, integrity, authentication, non-repudiation

Answer3.
πŸ‘‡πŸ‘‡πŸ‘‡
Digital signature is used a science that studies mathematical techniques related to aspects of information security, data integrity, and data authentication, namely cryptographs.

Answer4.
πŸ‘‡πŸ‘‡πŸ‘‡
The bit sequence will represent the original text which is then encrypted to get the text-code in the form of bits. Each plaintext process will be XORed with a key and will produce a ciphertext that will be used for the next process.

Answer5.
πŸ‘‡πŸ‘‡πŸ‘‡
Cryptography, in general, is the science and art of maintaining confidentiality.
the benefits of cryptography to solve problems that are arranged systematically. cryptographic agorithm is a logical step in how to hide messages from people who are not entitled to these messages.

Answer6.
πŸ‘‡πŸ‘‡πŸ‘‡
Uniswap

Refer Twitter id: @Kalpesh70853932
1 Point
0 Posts
1 Votes
 
0 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Loading...
Mehmetnurcan
FLAG POST
7M AGO

#nature

VID
2 Points
0 Posts
2 Votes
 
0 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Mehmetnurcan
FLAG POST
7M AGO

Cute

VID
3 Points
0 Posts
4 Votes
 
1 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
THE END :(
}
You Earned JUI 5
For Your Daily Login Activity
CLAIM NOW
Report Content
Please, select the reason:
Spam
Pornography
Hatred and Bullying
Self-Harm
Violent, gory and harmful content
Child Porn
Illegal activities e.g. Drug Uses
Deceptive Content
Copyright And Trademark Infringement
LOGIN
Connect with Facebook
Connect with Google
Connect with Twitter
OR
Username
Password
Keep Me Logged
Register Here
Resend Verification Link
Forgot Your Password?
SIGN UP
Connect with Facebook
Connect with Google
Connect with Twitter
OR
Username
Email
Password
Password Again
Login Here
Forgot Your Password?
FORGOT YOUR PASSWORD?
Connect with Facebook
Connect with Google
Connect with Twitter
OR
Your Email
Login Here
Create Your Account
UPLOAD NEW MEDIA
System message: Content relating to violence, smoking drugs or pornography is strictly prohibited. Administrators will be patrolling 24/7 and any users found with such content will be banned and all earnings from that user thrown back to reward pool.
Media
DROP FILE TO UPLOAD
OR
CLICK TO SELECT
Post Title
Post Description
Tags (Comma Separated)
Privacy
Sensitive Content?
Author Link
ADD NEW QUOTE
System message: Content relating to violence, smoking drugs or pornography is strictly prohibited. Administrators will be patrolling 24/7 and any users found with such content will be banned and all earnings from that user thrown back to reward pool.
Question
Quote
Author
Tags (Comma Separated)
Privacy
Sensitive Content?