-
As of #269, a lot of users need the ability to change the keyboard shortcut responsible about switching the keyboard layout. Those are the users who write using more than one language on their compute…
-
Distributed hash tables are powerful protocols that enable content discovering and routing in P2P networks. In "vanilla" DHT implementations (e.g. Kademlia), peer interactions leak a lot of informatio…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### I'm submitting a ...
- [X] bug report
- [ ] feature request
- [ ] support request --> Contact me over mail for…
-
A significant limitation of the current protocol is that strictly speaking, the proof is only valid for 1 block: the block at which the anonymity set was fetched.
Transactions post this block will …
-
This milestone issue tracks [Dandilion++](https://arxiv.org/abs/1805.11060) for Waku v2.
## Issues
* [ ] check waku Dandelion++ feasibility
- Does Dandelion++ offer the properties we want fro…
-
Hi, just finished the video and read through the paper. Lots of interesting stuff in there. Coincidentally, I've also been doing a lot of research in this area, and I've come across a few other projec…
-
**Objective**:
Develop a Python script or module that utilizes Selenium with a Tor proxy to obtain a WebDriver for browsing, ensuring anonymity. Additionally, include functionality to verify that t…
-
/spec a method to prove you did a bug bounty without revealing the solution using zero-knowledge proofs so that white hat hackers can get paid properly and incentivize cybersecurity in any industry
-
Comment from cdata:
I wouldn't go so far as to rule it out of scope, but in-scope may mean ensuring that anonymity by layering is well supported.
Comment from erangell:
At what level of the appl…
-
High level requirements for the Nomos Project:
1. Validators are anonymous within a larger set: of the nodes participating in a larger network, you don't know which ones are part of the Nomos netwo…