-
Below is the description of a **network-level spam protection** method using [rate-limiting nullifiers](https://ethresear.ch/t/semaphore-rln-rate-limiting-nullifier-for-spam-prevention-in-anonymous-p…
-
It's relatively easy to layer a voting protocol weighted by stake on top of Zcash. Most of the details were worked out at the Boulder summit in November 2014 (see photo). It requires a relatively eas…
-
The third installment of our series of group discussions about significant past censorship research will be:
["The Parrot is Dead: Observing Unobservable Network Communications"](https://censorbib.…
-
The taxonomy needs to be defined and be fairly complete before the correlation engine can be worked on.
-
Clarifying proxying and an overview of the case for or against using an outproxy with I2P to access the the clearnet.
Under what circumstances is it recommended ?
What would those circumstances be?
…
-
The ROBERT summary document contains the following diagram, showing authorities generating pseudonyms and transmitting them directly to users:
![image](https://user-images.githubusercontent.com/995…
-
The first patch of the page "adding a contact" is online. The detailed methods will follow soon.
Rpe23 updated
9 years ago
-
Since synapse is in it's early stage, a built-in proxy support (no matter it's socks or http) is necessary to keep the server safe from attackers.
#1234 related
https://github.com/vector-im/riot-…
-
## Is your feature request related to a problem? Please describe.
If Zcash achieves significantly higher usage, then the overall verification and transaction bandwidth cost will become a problem. I…
daira updated
4 months ago
-
For attempting to mix in with the larger anonymity set, it is obviously unhelpful that in the simplest form, a coinswap will consist of 2 pairs of transactions of (a) the same size and (b) being broad…