paint-brush
Explained: The Snax Trustless Authentication Protocolby@Snax
332 reads
332 reads

Explained: The Snax Trustless Authentication Protocol

by snax.one4mMarch 12th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The fundamental technology that allows Snax to operate is the binding of the blockchain transactions together with accounts on the social media platforms such as Twitter, Reddit and so on.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Explained: The Snax Trustless Authentication Protocol
snax.one HackerNoon profile picture
snax.one

snax.one

@Snax

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Bitcoininsider