-
"Popcorn", in the sense of a small value being custodied at the LSP on behalf of the client. The intent is that the coins lost in your couch are more valuable than the popcorn being custodied on your…
-
Around paritytech/polkadot-sdk#732 we've several partially orthogonal-ish ideas for approval votes: paritytech/polkadot-sdk#607 sounds great. paritytech/polkadot-sdk#701 gives clean security but co…
-
Both the original paper and the code assume that the input elements of the set used as leaves of the curve tree are *already* permissible points.
Thus if your input values (curve points) are not pe…
-
**Describe the bug**
Hunspell appears to be non-deterministic, at times some words are found to be spelling mistakes - rightfully so - yet others
**To Reproduce**
Steps to reproduce the behav…
-
Blinded [BIP341](https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki#blind-signatures) Schnorr signatures are vulnerable to Wagner’s attack. While there is a known mitigation it is yet to b…
-
A bounty has been opened on silentpayments.xyz from a trusted, anonymous source to implement sending support in BitBox firmware to Silent Payment addresses.
I wanted to open an issue here to raise …
-
Please share links for the reading list here. Thank you!
-
Per #32, specifically,
> I think the generator side of this definitely needs some experimentation, because while there are logical reasons for choosing a particular generator as standard, they aren…
-
on the ETH side, if someone decodes the bytecode of the smart contract, they would be able to see that the participants were using a Swap contract and thus Alice now owns some monero.
I'm not sure…
-
Add DLEQ proofs for This allows for users to proof that Public key A comes from private key a