What Are APIs?
APIs are very technical, and yet they are used everywhere. Simply put: APIs allow different apps and services to work together in various ways. In this video, I'll highlight four ways in which APIs...
Mining Bitcoin or Ethereum is a hard task for your computer. But why? And what does the difficulty have to do with the security of blockchains? Learn all about blockchains, consensus algorithms and...
Bitcoin is worthless (but so is your “real” money)
How can Bitcoin have any value? Is Ethereum worthless? Well, yeah! But so are your dollars, euros, yens. Money is a weird thing. It is not backed by gold or silver, but by our belief in it. Disclai...
How Bitcoin Wallets Work
Wallets in cryptocurrency work in a weird way. They also have some weird properties like: they can be created offline and be used directly. Whut? Let's see how it all works, Simply Explained!
Why DNA Data Storage is the Future
The fact that I have blue eyes, blond hair and that I have an average height is all encoded in my DNA. It’s nature’s way of storing data, but could we also use it to store digital data like documen...
DNS: The Internet's Phonebook
How does a computer know how to reach youtube.com? This domain name needs to be translated to an IP address and that's where DNS comes in. Let's learn how it works! The Domain Name System is an imp...
Mastodon & The Fediverse Explained
Mastodon is a "federated" social network that works like Twitter. It puts the control of data into the user's hands, not in a single corporation. Music used in this video: Intrics Leo by ...
Why is Free WiFi Dangerous?
We know public WiFi shouldn't be trusted, but why? What are the risks when do you connect to a coffeeshop network and how can you protect yourself for them? Music used in this video: Ticker by Sile...
Zero Knowledge Proof
Protecting your online privacy could become a lot easier with Zero Knowledge Proof. A technique that allows you to prove things without disclosing what it is you're proving. Need to have a certain ...
Does GDPR kill blockchains?
Will the new European privacy law kill blockchains? On first sight they seem incompatible with each other. So let's take a closer look! Sources This video wouldn't be possible without the work of o...
Graph Theory: Wolf, Sheep & Cabbage
Use Graph Theory to transport a wolf🐺 , sheep 🐑 and cabbage 🥗 across a river. Or use it to figure out how you can cross the 7 bridges of Konigsberg without crossing the same bridge twice. Or how...
Ethereum's Constantinople Update & Difficulty Bomb
Ethereum is about to get another big update. It's called Constantinople and will increase the performance of the network and introduce some new features. It will also delay the difficulty bomb. Her...
How do computers keep time?
My first laptop lost track of time, so that got me thinking: how do computers keep track of time? Can they do it forever? And why don't they lose track of time when we turn them off? Turns out the ...
How cookies can track you
Cookies can be used to invade your privacy and track you around the internet. But what are cookies and how do they work? They were initially invented to make our lives easier and are used to keep u...
Blockchains: How can they be used?
We've all heard about Blockchains but how can they be used in the real world? How can we apply them? What problems can they solve? Well, in this video I'll give you 9 examples: Cryptocurrencies Sm...