-
## Proactive policies & practices
- https://www.turnitin.com/blog/what-is-an-honor-code-and-why-is-it-important-to-academic-integrity
- https://www.turnitin.com/blog/starting-the-year-how-to-estab…
-
# Abstract
AI-generated, unbiased, easy-to-digest event summaries from governance across Discord, Twitter, Telegram, and Email that make governance accessible for a diverse group of voters.
# Propos…
-
Chapters 1, 2, 6 of Threat Modeling
- [x] All ethresearch post related to validator privacy
- [x] https://moodle.ufsc.br/pluginfile.php/2377555/mod_resource/content/2/Threat%20Modeling.pdf
…
-
**Balancing Privacy and Security with an Anti-Fraud Safelist**
**Background**
Today’s fraud controls are a societal good and a necessary part of our global economy. At the same time, internet us…
-
Table details:
- [ ] Title: Contracting process red flags
- [ ] Description: A list of all the red flags associated with contracting processes. Filter by the Item Category, Buyer Name, Supplier Na…
-
Hello,
I'm opening this issue to call out a specific technique that may be straightforward and reliable to use for cross site tracking with FLEDGE, to determine if it is in fact viable, and if it i…
-
Currently doing a survey in spare 5 ECTS this Q3 quarter. (EU-ID or Euro) {also has part-time job}
Aims to finish the 10 ECTS survey by end of Q1. Thesis start Q2 (29 Nov 2023).
Conduct a survey,…
-
Title: PM double spend security
Author: @yondonfu
# Brief Description
PM (probabilistic micropayments) is a useful scheme for many-to-many payments with a single funding deposit enable…
-
-
Hey, @michaelkleber,
We just had a few minutes to chat yesterday during the IWABG call, and I want to make sure your critique of MURRE gets the attention it deserves, so I'm opening this issue. I a…