-
We need to do a documentation or a video (slides with voice will do too) on the steps involved in a demo run, and how one can use that as a starting point to build their application for enhanced trust…
-
## Summary
The recent proposal/movement to allow anyone to run a validator on our PoA-based Substrate blockchain raises some concerns. While this initiative aims to enhance network security, based on…
-
## Description
This proof of concept is to evaluate how search engines can be used to index Beckn websites and make them discoverable. It is an alternate model to a central registry-based mechanism…
-
# Background
Today, cross-border trade and transport of goods take place on the basis of many documents and processes that are paper-based (hence manual), time-consuming, and resource-intensive pro…
-
### Summary
OpenBao’s SSH engine is limited to one Certificate Authority (CA) issuer per mount. This complicates the key rotation process, which is usually a desired feature for security and operat…
-
THE IDEAL PATH
What if we replace the controlled and surveilled IP addresses with new internet addresses that are based on monero address? These addresses will inherit all monero address features, i.…
-
### Description
As a proof of concept, the cache system will process either Getty or LOC's activity streams to perform incremental updates to the cache.
Getty
* https://data.getty.edu/museum/co…
-
Here's an example break down of how long it takes from smoldot's initialization (when we enter the smoldot Rust code) to warp syncing being completely finished in a best case scenario: (done on top of…
-
## Description
Create a multi-page application flow for Operating Authority applications with proper data structure and user interface.
## Success Criteria
- Complete applications can be submitte…
-
# Lines of code
https://github.com/code-423n4/2023-03-wenwin/blob/91b89482aaedf8b8feb73c771d11c257eed997e8/src/LotteryToken.sol#L23
# Vulnerability details
## Impact
LotteryToken is the native tok…