paint-brush
690 reads
690 reads

Hako

by David Richard Holtz12mApril 7th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

<strong>Hako</strong> uses protocol called proxy re encryption to secure and permission data efficiently.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Hako
David Richard Holtz HackerNoon profile picture
David Richard Holtz

David Richard Holtz

@david.richard.holtz

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Ipfs
Theteams
Porter
Aryan
Tazod