-
# Rationale
Underpowered devices (e.g. on ARM architecture) take very long to calculate the PoW. As time progresses, the difference in hashing capacity may diverge even further, some people unable to…
-
### Abstract.
The CORION development team states that there should be no manual control mechanism in CORION system. At the other hand, the manual control mechanism is a required tool for debugging …
-
It would be good to define a Nostr Strategy for Bisq. That way contributors can use Nostr in a way that has been agreed / contributed to by the DAO.
Examples of what a Nostr Strategy for Bisq might…
-
HTTPT: A Probe-Resistant Proxy
Sergey Frolov, Eric Wustrow
https://censorbib.nymity.ch/#Frolov2020b
https://www.usenix.org/conference/foci20/presentation/frolov (video and slides)
https://github.c…
-
_Also known as whitelists, blacklists, blocklists, deny lists, etc._
For many reasons, it's important for people operating IPFS nodes to have the option of specifying which content they will, or wo…
-
I find some of the description of namespace consistency in GNS rather questionable, as the DNS suffers from the same observed aspects, but the text reads as if these characteristics were weak design o…
-
Hello Zcashers! I am the co-founder of [Bitseed](https://bitseed.org/), a project with a mission to make it easy for anyone to run their own bitcoin full node. In the past we have experimented with al…
-
The next live reading group discussion will have a twist: this time we'll read a paper that has a pro-censorship point of view, coauthored by one of the creators of the Great Firewall.
[Sunday, 202…
-
What requirements do we actually have on offchain XCMP and how does it compare to ISMP?
Some good overview on XCMP can be found [here](https://forum.polkadot.network/t/xcmp-design-discussion/7328).…
-
The idea is to (somewhat) follow the practice of reinforcement learning as described by [Michael Nielson](http://michaelnielsen.org) in [Augmenting Long-term Memory](http://augmentingcognition.com/ltm…