-
To be discussed
-
# Rationale
Underpowered devices (e.g. on ARM architecture) take very long to calculate the PoW. As time progresses, the difference in hashing capacity may diverge even further, some people unable to…
-
**Motivation and Overview**
The goal of our proposed project is to research how techniques inspired from the area of differential privacy (DP) can be used in order to construct anonymous cryptocurr…
-
extremely complex request, but at least I want to elaborate on it.
possible alternatives:
- take advantage of our proxy-related patch + a service such as https://thesocialproxy.com or https://br…
uazo updated
2 months ago
-
What's the difference between your (?) implementation of Double Ratchet Algorithm and OMEMO?
Would it be sensible to use OMEMO instead?
-
Point Time Locked Contracts (PTLC) scripts allow for swaps to look like normal transactions. Especially with Taproot, Schnorr signatures and tapscripts greatly increase the ability to blend into the c…
-
Hello,
I would like to propose the addition of a forward proxy feature to our system. A forward proxy acts as an intermediary server between client devices and target servers, enhancing network sec…
ghotm updated
3 months ago
-
Maintaining lightning purchases in a decentralized way has been a big use case for WebLN for me, but going the node identity route poses some obvious privacy issues (that I appreciate everyone raising…
-
The protocol currently states:
> If privacy is very important to you, you might consider using a service like Shapeshift to exchange your Bitcoins for an more anonymous cryptocurrency, such as Mone…
-
# Context
Borrowed from https://forum.vac.dev/t/vac-sustainability-and-business-workshop/116
> Waku nodes provide services that have a specific cost and this should be incentivized in a service n…