It looks like you're new here. If you want to get involved, click one of these buttons!
I accidentally snorted out whisky at reading half of these ... I was only trying to find the quote that no one has yet devised, concocted, imagined, or plausibly advocated a use case
https://www.cryptoaltruism.org/blog/15-quotes-about-the-potential-of-blockchain-and-crypto
https://www.theatlantic.com/ideas/archive/2024/12/how-bitcoin-became-boring/681141/Bitcoin was designed to be a currency that people could use for trustless transactions—transactions that could be carried out without need for a financial intermediary such as a bank. But transactions in which bitcoin is used to buy or sell goods and services make up only a tiny fraction of the currency’s total trading volume, most of which is made up of people buying or selling bitcoin itself.
...
[B]itcoin was designed to facilitate decentralized person-to-person transactions, but most bitcoin trading, at least in the West, now takes place on centralized exchanges. Again, in its liberatory promise, bitcoin was supposed to not just be independent of traditional financial institutions and government, but also enable alternatives to them. Yet the big engine of the price boom of the past two years has been bitcoin’s integration into the conventional investment industry (through such vehicles as exchange-traded funds, or ETFs), increased purchases by institutional investors and corporations, and now the prospect of legitimization by the government itself.
It’s also not as if Kapersky doesn’t have a financial reason to make your think your computer is less secure than it is (and many of its contentions about security updates on MacOS and Safari are just plain wrong).The myth about Apple, read (https://usa.kaspersky.com/resource-center/threats/mac-vs-pc-security)
Some good/interesting points, even if it comes from a company recently booted from the USA.....
Be careful what you click on. Better yet, don't click on anything.I am a computer illiterate.
Does security features in an OS translate into prevention of virus and malware being implanted in your device? If not, what are the means thru which these things get into my device? I am starting to use mobile Apps on occasion to access financial institutions.
Many times, yes. It's a combination of security features designed by the vendor (eg SIP or Gatekeeper on Macs that are on by default) or users taking steps themselves, such as downloading a more secure browser, using different security/privacy plug-ins or their browser, etc, etc.I am a computer illiterate.
Does security features in an OS translate into prevention of virus and malware being implanted in your device? If not, what are the means thru which these things get into my device? I am starting to use mobile Apps on occasion to access financial institutions.
© 2015 Mutual Fund Observer. All rights reserved.
© 2015 Mutual Fund Observer. All rights reserved. Powered by Vanilla