40348
REGISTERED USERS
17833
PUBLISHED POSTS
189690649
TOKENS
GIVEN AWAY
17584636
THROUGH USERS
REWARDING POOL
JUI 189,690,649 (12.65%)
JUI 1,500,000,000
Loading...
#solve
Blob Bob
FLAG POST
2M AGO

Solve Only With 4 Moves

note-it has to be solved first
VID
5 Points
0 Posts
5 Votes
 
0 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Blob Bob
FLAG POST
2M AGO

Speed Demond

another 3x3x3 cube solve
VID
SOURCE: BLOB BOB
5 Points
0 Posts
5 Votes
 
0 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Blob Bob
FLAG POST
3M AGO

2x2 Rubiks Cube Solve

next I will do a 3x3
VID
SOURCE: BLOB BOB
12 Points
0 Posts
13 Votes
 
1 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Loading...
Blob Bob
FLAG POST
3M AGO

2x2 Cube Solve

2x2 solve, also idk if this uploaded so im doing it again
VID
SOURCE: BLOB BOB
4 Points
0 Posts
5 Votes
 
1 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
Den2872
FLAG POST
3M AGO

2800$ Legit Airdrop

πŸš€ UniBlue Finance (UBF) Airdrop πŸš€

πŸ’° Rewards: 400-UBF ($2800)

πŸ”₯Join here:
https://docs.google.com/forms/d/e/1FAIpQLScfbFovida1VUSbbeYFDKB8Z8T78Vf34DU1IPfitDy90AZt0g/viewform?entry.1466678886=@Kalpesh70853932

Twitter and Retweet with Tags 3 Friends

Quiz: Use this link for your Answers HereπŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Answer1.
πŸ‘‡πŸ‘‡πŸ‘‡
Symmetric-key cryptography, Public-key cryptography

Answer2.
πŸ‘‡πŸ‘‡πŸ‘‡
Confidentiality, integrity, authentication, non-repudiation

Answer3.
πŸ‘‡πŸ‘‡πŸ‘‡
Digital signature is used a science that studies mathematical techniques related to aspects of information security, data integrity, and data authentication, namely cryptographs.

Answer4.
πŸ‘‡πŸ‘‡πŸ‘‡
The bit sequence will represent the original text which is then encrypted to get the text-code in the form of bits. Each plaintext process will be XORed with a key and will produce a ciphertext that will be used for the next process.

Answer5.
πŸ‘‡πŸ‘‡πŸ‘‡
Cryptography, in general, is the science and art of maintaining confidentiality.
the benefits of cryptography to solve problems that are arranged systematically. cryptographic agorithm is a logical step in how to hide messages from people who are not entitled to these messages.

Answer6.
πŸ‘‡πŸ‘‡πŸ‘‡
Uniswap

Refer Twitter id: @Kalpesh70853932
1 Point
0 Posts
1 Votes
 
0 Votes
Share
NO COMMENTS YET, BE THE FIRST! :)
THE END :(
}
You Earned JUI 5
For Your Daily Login Activity
CLAIM NOW
Report Content
Please, select the reason:
Spam
Pornography
Hatred and Bullying
Self-Harm
Violent, gory and harmful content
Child Porn
Illegal activities e.g. Drug Uses
Deceptive Content
Copyright And Trademark Infringement
LOGIN
Connect with Facebook
Connect with Google
Connect with Twitter
OR
Username
Password
Keep Me Logged
Register Here
Resend Verification Link
Forgot Your Password?
SIGN UP
Connect with Facebook
Connect with Google
Connect with Twitter
OR
Username
Email
Password
Password Again
Login Here
Forgot Your Password?
FORGOT YOUR PASSWORD?
Connect with Facebook
Connect with Google
Connect with Twitter
OR
Your Email
Login Here
Create Your Account
UPLOAD NEW MEDIA
System message: Content relating to violence, smoking drugs or pornography is strictly prohibited. Administrators will be patrolling 24/7 and any users found with such content will be banned and all earnings from that user thrown back to reward pool.
Media
DROP FILE TO UPLOAD
OR
CLICK TO SELECT
Post Title
Post Description
Tags (Comma Separated)
Privacy
Sensitive Content?
Author Link
ADD NEW QUOTE
System message: Content relating to violence, smoking drugs or pornography is strictly prohibited. Administrators will be patrolling 24/7 and any users found with such content will be banned and all earnings from that user thrown back to reward pool.
Question
Quote
Author
Tags (Comma Separated)
Privacy
Sensitive Content?