-
We need some access control mechanisms for Tungsten.
From @nomeata on Slack:
> We need the runtime to provide the check access method, and provide a way for developers to manage that whitelist. Co…
-
# ORC-69 The Session X Coin (SEX)
## Table of Contents
1. [Terminology](#terminology)
1. [Intro](#intro)
1. [Problems](#problems)
* [OXEN tokenomics cannot support the growing Session netwo…
-
[MiMC] is the result of the design approach of "let's do a traditional symmetric-flavored secure hash function, but using primitives that are efficient within a SNARK".
* original paper: http://epr…
-
We need to define a threat model for what is and is not in scope as threats we will be considering. This document doesn't need to be complete, but it needs to at least be a starting point.
# Questi…
-
Questions for Herb Lin, inspired by the week's readings:
1. Herbert Lin & Amy Zegart, Chapter 1 (Introduction) from Bytes, Bombs, and Spies
2. National Research Council, Summary section from At th…
-
In this system, the interest groups are available to the user. That means a competing advertiser B has direct access to specific elements of the marketing strategy of advertiser A. This may already be…
-
Hi all-
I really enjoy a particular type of unorthodox character creation called "the Funnel" (not my invention by the way). In the Funnel, each player gets a number of randomly generated "Level 0" c…
-
On behalf of Oracle, thank you for the opportunity to respond to the White House IT Modernization Request for Comment. Attached please find our comments. We look forward to discussing this further.
…
-
Red user is missing any abilities, atomic plugin is enabled and loaded
**To Reproduce**
Steps to reproduce the behavior:
1. Deploy caldera, enable atomic plugin, login as red user
**Expected …
-
Hello, I've heard about this amazing project and its goal to increase entropy for a stronger security. I've developed recently after a long road (3-4 years) of personal research a formula that might b…