Chapter
Using Cryptocurrency to Track Data and Ensure Cybersecurity
The use of cryptocurrency instruments to create a chain of custody for data can improve cybersecurity. By programming hashes and data into the instrument, manufacturers can track the source of data and regenerate it from its code, allowing for better protection against cyber attacks.
Clips
Sharing code and data through a crypto instrument can create a chain of custody for the data itself that are streamed and written on chain, making every step audible and improving the quality of research and findings.
3:15:01 - 3:17:51 (02:50)
Summary
Sharing code and data through a crypto instrument can create a chain of custody for the data itself that are streamed and written on chain, making every step audible and improving the quality of research and findings.
ChapterUsing Cryptocurrency to Track Data and Ensure Cybersecurity
Episode#331 – Balaji Srinivasan: How to Fix Government, Twitter, Science, and the FDA
PodcastLex Fridman Podcast
The age of recipients of R01 grants by NIH gradually increases by approximately one year per year.
3:17:54 - 3:20:46 (02:52)
Summary
The age of recipients of R01 grants by NIH gradually increases by approximately one year per year.