-
Bitsquare cannot be used inside China mainland because Tor is blocked by the (not so) great Firewall.
We want to set up a bounty for finding the best technical solution to overcome that problem.
I…
-
you have the core functionality down but now you have to think about how it will be used.
it's useful to think about how you would use this code if someone else wrote it.
so here's a full encode a…
-
**[ UUID ]** 69e98b4b-a81b-4cb9-95f1-791e8a841bac
**[ Session Name ]** IVT Cipher
**[ Primary Space ]** Privacy and Security
**[ Secondary Space ]** Digital Inclusion
**[ Submitter's Name ]** Sai ch…
-
No examples given for hiding and unhiding text please reply with 2 examples.
-
to foster community involvement - some richer sample code beyond MNIST should be tackled.
Generative Adversarial Networks is a hot topic amongst ML - and some sample code using swift should help enco…
-
to foster community involvement - some richer sample code beyond MNIST should be tackled.
Generative Adversarial Networks is a hot topic amongst ML - and some sample code using swift should help enco…
-
I was wondering if you had any ideas on how to keep the lessons downloaded in order? I tried to download a course and the course titles were not helpful nor were the creation times. Any thoughts? Appr…
-
what does it mean ? Is there noise i need to clean ?
-
Hi,
Could you review the encryption tools & apps of http://www.paranoiaworks.mobi/download/ ?
I can find them very useful. They have steganography, file & text encryption, password manager and suppo…
-
https://arxiv.org/pdf/1709.02656.pdf
https://arxiv.org/abs/1709.02656