This entry is part 6 of 6 in the series Crypto-Crossword

YOU CAN PRINT OUT THIS PAGE OR
JUST GET A PIECE OF PAPER AND WRITE DOWN THE ANSWERS
“OLD SCHOOL”

The answers to Puzzle #6 will be in Puzzle #7

 

ACROSS

DOWN

  1.  Currently (Nov 2018) one of the Top 15 cryptos, this privacy coin has an inflation aspect controlled by it DAC for the promotion of the coin.  Max Keiser and a Baldwin brother toured the USA promoting it.
2. Smartphones are the worst when it comes to security. Besides most people not having a password on their device, they keep in autofill features, keep their apps running, and are logged into all of their important apps. That means that anyone who clones your phone or even gets a hold of it has your information and you don’t know where they’ve sent your funds.

To add to that, cloning a phone number for further verification is a lot easier than you would think… ????? OS™ is designed to support native Blockchain applications, such as a crypto wallet, secure exchange access, encrypted communications, and a P2P resource sharing ecosystem for payment and apps, supported by the SRN token.”

3.  This crypto was recommended by McAfee and wrongly reported that he suggested it would hit $15,,, soon after witch it took a nose dive. 4.  OOPS (not exactly a privacy coin)

Designed from the ground up for mass adoption it is the world’s first app-based mobile miner. It claims to be the only Cryptocurrency embracing KYC & AML (until WORBLI) and has signed Agreements with global mobile networks. It claims to be the easiest cryptocurrency in the world to integrate and use.

5. This blockchain platform uses an open-source cryptocurrency for doing transparent, anonymous, private, and fungible transactions. They are then made ultra-secure using Bitcoin’s blockchain via a Delayed Proof of Work (dPoW) protocol. It was forked from ZCASH. 6.  Based in Ayr, Scotland, this crypto express a desire to provide security and privacy for everyone on the planet. This has been their ambition since 2006. This

Network is powered by the spare computing power of its users, with data stored as encrypted pieces on other people’s devices, in storage locations called Vaults.

7.Connecting cars to blockchain will result in burgeoning of the demand for network security. This crypto will provide a robust multilayered security that is vehicle-optimized, using their blockchain, endpoint and cloud checkbox technology. 8. This crypto benefits from a DPoS based Graphene underlying architecture, provides a leading solution for the data economy by developing multiple trusted data modules.Its “Data Matrix” focuses on providing customers with highly encapsulated data components that enable them to have powerful data acquisition capacity, analyze user images, improve risk control skills, support SaaS mode and privatization deployment.
9.  This crypto was forked from BTC. Like Bitcoin, its transaction data is posted to a public blockchain; but unlike Bitcoin, it ensures your personal and transaction data remain completely confidential. Zero-knowledge proofs allow transactions to be verified without revealing the sender, receiver or transaction amount. It allows for transparent transactions, to accommodate for wallets and exchanges that don’t support private transactions.
10. Formerly called “ZenCash”, this crypto is a fork of ZClassic which is a fork ZCash. All three are privacy focused Cryptocurrencies that are based on zero knowledge proofs (zk-SNARKs) which uses Equihash Proof of Work algorithm.
11. This crypto is the asset that gave way to Monero (XMR), but due to scandals with a pre-mine, and the withdrawal of the community, it remained relatively obscure. In essence, it is a CryptoNote digital asset, which may now, in theory, be mined by ASIC
12. This crypto is currently has the largest market cap of all “privacy coins”. Its name is Spanish for “money’.
13. This crypto is not merely a universal cross-chain protocol, it is a distributed ledger that records cross-chain and intra-chain transactions. The ledger not only supports smart contracts, but also supports privacy protection via Ring signature and provides the ability for the receiver to correctly verify that the sender did in fact sign the transaction. The optional One Time Addresses (OTA) provides complete anonymity for the receiver of every transaction. Private Send function breaks down every transaction input to a standard denomination, thereby providing further obfuscation to the transaction amount.

__________________________________________________________________________________________________

ANSWERS TO PUZZLE #5 HERE

_________________________________________________________________________________________________________________

Special thanks to the DAO INDEX’s & FUNDS for sponsoring this puzzle. We believe that people should be FREE to invest how they want without the “NANNY STATE” looking over their shoulder and stealing whatever they can get their hands on (aka: non-voluntary taxes).

POWER TO THE PEOPLE !!!

YOU CAN GET A TRYBE.ONE ACCOUNT AND START EARNING TOKENS BY SIGNING UP AT THIS (click)LINK(click)

Read other blogs by this poster at:
https://trybe.one/members/i-am/blog/

If you found this article useful, or just think someone else might enjoy it, PLEASE click the “Recommend” button next to the rating stars.

HELP make TRYBE more valuable by SHARING posts on
FaceBook, Twitter, LinkedIn and Reddit with the
BUTTONS below!

6 votes, average: 5.00 out of 56 votes, average: 5.00 out of 56 votes, average: 5.00 out of 56 votes, average: 5.00 out of 56 votes, average: 5.00 out of 5 (6 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
(1200 total tokens earned)
Loading...

Responses

  1. Miguel A. Cabanes

    Do you use any special program to create them? This does not seem like it but it also has work behind it.
    Regarding the #3 Across, McAfee has recommended so many and failed in so many, that can be almost any currency.
    He, he! Regards!

    (1)