Blog

Updates and Insights

What is a Sybil Attack?

A Sybil attack happens when bad guys spoof user accounts. In the digital world, where trust and security are vital, […]

{"items":[{"label":"Announcements","url":"https:\/\/hemi.xyz\/blog\/category\/announcements\/","selected":""},{"label":"Bitcoin","url":"https:\/\/hemi.xyz\/blog\/category\/bitcoin\/","selected":""},{"label":"Ethereum","url":"https:\/\/hemi.xyz\/blog\/category\/ethereum\/","selected":""},{"label":"Hemi","url":"https:\/\/hemi.xyz\/blog\/category\/hemi\/","selected":"selected"},{"label":"Learn Center","url":"https:\/\/hemi.xyz\/blog\/category\/learn-center\/","selected":""},{"label":"Partnerships","url":"https:\/\/hemi.xyz\/blog\/category\/partnerships\/","selected":""},{"label":"Press Releases","url":"https:\/\/hemi.xyz\/blog\/category\/press\/","selected":""},{"label":"Security","url":"https:\/\/hemi.xyz\/blog\/category\/security\/","selected":""},{"label":"Video","url":"https:\/\/hemi.xyz\/blog\/category\/video\/","selected":""},{"label":"Webinar","url":"https:\/\/hemi.xyz\/blog\/category\/webinar\/","selected":""}],"_content":""}

Making Decentralized Apps With the Hemi Bitcoin Kit

Putting programmability into Bitcoin TL;DR Thanks to smart contracts, Ethereum has become home to decentralized apps. Hemi unlocks a similar […]

Let’s get social

Connect with us