Why does BIP-340 use secp256k1?

If the entire Taproot/Schnorr soft-fork was going to implement an entirely new signing scheme anyway that was completely independent from the previous ECDSA scheme, why did it use secp256k1? Couldn’t it have used other curves, like Curve25519 and its signature schemes that are being used by many other projects? Wouldn’t that come with a lot […]

How crypto is leading the way in upskilling

Upskilling focuses on expanding employees’ abilities and scope of knowledge within their current field. Our always-on mentality toward upskilling drives investment in the growth and advancement of our global team through initiatives like our Talent and Development program. Why invest in upskilling? Doom and gloom about technology eliminating human jobs has been around for hundreds […]

Demystifying a Common Cybersecurity Myth

Mar 13, 2024The Hacker NewsApp Security / Cyber Security One of the most common misconceptions in file upload cybersecurity is that certain tools are “enough” on their own—this is simply not the case. In our latest whitepaper OPSWAT CEO and Founder, Benny Czarny, takes a comprehensive look at what it takes to prevent malware threats […]

Back To Top