OluwatumininuThe ‘Origin’ of Sybil AttacksShirley Mason was sexually abused by her mother as a young child. She suffered traumatic stress, and mental breakdowns as she grew up.Nov 9, 2023Nov 9, 2023
OluwatumininuCryptojacking in cyber security (part 2): Preventing Jackers from accessing your computer.In February 2018, Tesla faced an incident where their cloud infrastructure was compromised by cryptojackers. According to TrendMicro, the…Oct 26, 2023Oct 26, 2023
OluwatumininuNeutron: A Centralized and Decentralized WalletInsights and Musings From Leslie’s Lost Hard DriveJun 19, 2023Jun 19, 2023
OluwatumininuThe Ultimate Pool For Crypto Mining (A UI/UX Case Study)The Hidden Crypto TreasureMay 25, 20232May 25, 20232
OluwatumininuWeb 2.0 , Web 3.0, What are the Differences?The Internet evolved gradually over years, transitioning from the passive to the interactive experience. The fixed, document-based Web has…Mar 2, 2022Mar 2, 2022