-
The 1Exodus marker address is making it easy to people to censor Master Protocol transactions.
This spec issue is a placeholder for discussion on how to upgrade the protocol in a way that will make su…
-
I really like the thought process behind this. Nice idea.
-
Feature gate: `#![feature(strict_provenance)]`
[read the docs](https://doc.rust-lang.org/nightly/std/ptr/index.html#strict-provenance)
[get the stable polyfill](https://crates.io/crates/sptr…
-
Hi @martykan
I found [this app](https://play.google.com/store/apps/details?id=com.rocasoftware.weatherapp) on the Google Play Store. This guy just took your source code, added some ads in it and p…
-
Leave below as comments your memos that grapple with the topic of The Future, inspired by the readings, movies, & novels (at least one per quarter), your research, experiences, and imagination! Also a…
-
The docs seem to imply that md5 is the only hash users can use. The vulnerabilities of md5 have made it not usable in many organizations which require a certain level of security.
Is the a way to u…
-
Bitmain will begin shipping the Z9 Equihash miner soon. Let's use this thread to discuss ASIC resistance: Is it something we want to spend the time/resources to continue, or should we embrace ASICs?…
-
@bclermont @m8m5 @jordanorelli @akamensky @5k3105 @longlongh4 @aebruno @nnvn @hvnsweeting @KellyLSB @pekim @joesis @mixedCase @xland
Hey
I'm planning to offer the binding under a second (additio…
-
Following up from some twitter discussion a couple weeks back. I propose changing the default discovery algorithm in three ways in order to improve default privacy:
- 1. be able to verify known tru…
-
Sometimes you have to ask the question whether something should be done at all, and trusted computing is certainly one of those cases where the answer is obviously a big fat NO.
So please reconside…