-
Tracking issue to collect the topics that folks are interested in disucssing during the lightning dev summit in June.
**Please submit topics that you would like to discuss in the comments.**
Ge…
-
### Name of Demo
Visual Hash - Applying image hashing technology to verifiable credentials
### Demo Details (for titling)
![image](https://user-images.githubusercontent.com/69150249/19204478…
-
Hi @DreamingRaven,
First of all, thanks for your preliminary work enabling FHE in machine learning. I had two questions in mind specifically about the longevity and long-term goals of this project,…
-
1.This paper introduces BNaT, which stands for Blockchain Network Attack Traffic, a novel intrusion detection dataset created from a real blockchain network in the researchers' laboratory, which is pr…
okoba updated
2 years ago
-
wer den weltuntergang NICHT sieht, der liest die falschen nachrichten (blaue pillen)
welche news lese ich? also, wem glaube ich?
**iceagefarmer**
iceagefarmer @ telegram
archiv: https://mi…
-
A very common use case in the VC ecosystem is the presentment of VCs as VPs. Usually, the verifier is interested in whether the holder is the legitimate subject of the presented VCs, so they can answe…
-
Example: https://mila.quebec/en/publications/
It would be nice to reuse the same code as in the Mila website. Not sure if that's 'easily' possible via RTD
-
-
Hey there, curious minds of our amazing community! We’re going to have our first Monthly Dev Call for you!
Got a question about our products? Itching to know more about that feature you love? Or perh…
-
### Description
This engagement grant is to advance the discussion on 4 of the following threads.
MatMat is the recipient of this grant
### To Complete
- Pick 4 of the following threads to comment on
…