Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/df/00/da/df00da32-6e87-b4a1-b4dd-019292378b30/mza_2854198060373677096.jpg/600x600bb.jpg
Blockchain: The Future of Money
KUAF 91.3 Public Radio
12 episodes
1 week ago
Eric and Leigh welcome a new guest, Jacob, a writer for the online publication Crypto Briefing to talk about some of the risks of participating in blockchain and cryptocurrencies, the difference between a hack and a vulnerability, nefarious actors in this space and how to avoid them.
Show more...
Education
RSS
All content for Blockchain: The Future of Money is the property of KUAF 91.3 Public Radio and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Eric and Leigh welcome a new guest, Jacob, a writer for the online publication Crypto Briefing to talk about some of the risks of participating in blockchain and cryptocurrencies, the difference between a hack and a vulnerability, nefarious actors in this space and how to avoid them.
Show more...
Education
https://npr.brightspotcdn.com/dims4/default/4a8ffb4/2147483647/strip/false/crop/1400x1400+0+0/resize/1400x1400!/quality/90/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2Ff2%2Fe7%2F377c2e1f4e2f954c2a0a8bb9b534%2Fblockchain-1400.jpg
Episode 6: More NFT Talk with Matt
Blockchain: The Future of Money
34 minutes
3 years ago
Episode 6: More NFT Talk with Matt
Eric, Jasper and guest Matt Gray, developer of an app that turns your videos and photos into NFTs, discuss more about non-fungible tokens, their storage and metadata.
Blockchain: The Future of Money
Eric and Leigh welcome a new guest, Jacob, a writer for the online publication Crypto Briefing to talk about some of the risks of participating in blockchain and cryptocurrencies, the difference between a hack and a vulnerability, nefarious actors in this space and how to avoid them.