-
Bear with me. What if public keys are not present in an event?
Imagine if the protocol accepted empty pub key fields. Empty pubkey events are not verifiable unless you:
- Verify every new event a…
-
## Understanding Polkadot’s Networking Protocol
### Description
An overview of the networking protocol used by Polkadot, including how nodes communicate and maintain the network
### Resources
…
-
Reporting client version: 515.1640
## Issue Summary
Orange Flame Temperature - 1000-1200°C
Bright yellow Flame Temperature - 1200-1400°C
Being on fire raises body temp to 1350C.
Titatiun melting …
-
Consider the simple example of Alice and Bob who are both enabled with DIDComm messaging infrastructure and Alice wanting to send a message to Bobs DID which she has discovered by some means. Resolvin…
-
### Prerequisites
Please put an X between the brackets as you perform the following steps:
* [x] Check that your issue is not already filed:
https://github.com/leanprover/lean4/issues
* …
-
This issue attempts to collect our options regarding proof-of-work on node identities.
This isn't a complete solution just yet, more a place where we can dump thoughts and
collect research.
First…
-
Hi OpenID4VCI authors! With a cross-pilot working group we’re specifying [Hierarchical Deterministic Keys](https://github.com/sander/hierarchical-deterministic-keys) (HDKs) for the European Digital Id…
-
This is missing proof of work based solutions - these slow down spammers by changing the amount of work they can do in a given time, making a site using them less profitable per attack.
Upsides; n…
-
https://github.com/cucapra/packet-scheduling/discussions/16 discussed PIEO trees, and #17 goes a long way towards formalizing these and fleshing out an OCaml implementation. This issue is to track a r…
-
I've been planning to do something like this for a long time, to become an official part of igraph, but I just don't have the spare capacity. Would it make sense to work together? We'd have to find ou…