-
_Investigate restricting communication for security_
There are various techniques to prevent an adversary for creating numerous identities and overflowing the network. Latency is restricted by the …
-
Idea, A third use case for $CLO:
What if anyone would like to make a vote for something, in their company, or sports team or something.
They would google make a voting online. Here Callisto netw…
ghost updated
4 years ago
-
## 🚀 Feature
1. i want a easy way to create transaction, [not like create transaction must bind vm and ledger](https://github.com/AleoHQ/snarkOS/blob/testnet3/node/ledger/src/lib.rs), and then …
-
Discussing on-chain governance at this point is an interesting intellectual exercise but it is so far away from being a realistic solution to any of Ethereum’s problems that our scarce attention would…
-
**Project:**
Helium data analysis - HeliumAnalysis.io (to be secured)
**Elevator Pitch:**
The project seeks to provide consolidated data and analysis of network performance and statistics in …
-
Vulnerable Library - sklearn-0.0.tar.gz
Path to dependency file: /pi_nexus/components/requirements.txt
Path to vulnerable library: /pi_nexus/components/requirements.txt,/blockchain_integration/pi_n…
-
Brazilian Portuguese is known for being more flexible with use of foreign words than European Portuguese.
Words like layout, e-mail, pizza, item are accepted even in more formal registers.
Recentl…
-
Bitmain will begin shipping the Z9 Equihash miner soon. Let's use this thread to discuss ASIC resistance: Is it something we want to spend the time/resources to continue, or should we embrace ASICs?…
-
Hi,
I have just found your project and seems very interesting to me.
I'm working now on tracking objects, and that's how I found it.
So now I'm trying to process a lot of information: the code, t…
-
### Abstract
The following is an RFC for the Stacks Code of Conduct (Beta Version). Please review, make comments and suggestions on the proposed code of conduct. Prior work on the Code of Conduct and…