Chapter

Using Cryptocurrency to Track Data and Ensure Cybersecurity
listen on SpotifyListen on Youtube
3:15:01 - 3:20:46 (05:45)

The use of cryptocurrency instruments to create a chain of custody for data can improve cybersecurity. By programming hashes and data into the instrument, manufacturers can track the source of data and regenerate it from its code, allowing for better protection against cyber attacks.

Clips
Sharing code and data through a crypto instrument can create a chain of custody for the data itself that are streamed and written on chain, making every step audible and improving the quality of research and findings.
3:15:01 - 3:17:51 (02:50)
listen on SpotifyListen on Youtube
Crypto Instrument
Summary

Sharing code and data through a crypto instrument can create a chain of custody for the data itself that are streamed and written on chain, making every step audible and improving the quality of research and findings.

Chapter
Using Cryptocurrency to Track Data and Ensure Cybersecurity
Episode
#331 – Balaji Srinivasan: How to Fix Government, Twitter, Science, and the FDA
Podcast
Lex Fridman Podcast
The age of recipients of R01 grants by NIH gradually increases by approximately one year per year.
3:17:54 - 3:20:46 (02:52)
listen on SpotifyListen on Youtube
Grants