-
My installation log isn't for advertising space. If you want donations, please do the right thing and promote yourself in places where appropriate. My logs are long enough as it is without this.
Th…
-
### Description
There are a bunch of Node construction helpers which take anywhere from one to 5 params. Two of these params are for offline mode and mock mining, aka alwaysWinningTicket. Offline m…
-
So, I came across this issue with my pool.
It seems that there are times when mining a block is guaranteed to get you a rejected block even if you find a valid solution...
How would one use RPC to c…
-
I think current Lisk DPoS is way to centralised and vulnerable to many attacks. One person with big wallet can possibly up vote all his 101 delegates to top 101 forging with current implementation. Th…
ghost updated
5 years ago
-
Hello,
Thank you for sharing the trained model. I tested it today on a few sentences and found that it is able to catch most single term symptoms/signs. I should also say the performance was pretty…
-
It's impossible to create an account with multiple stealth addresses.
Can anyone confirm this?
-
Hello, I have a couple questions in regards to how best to handle activities that occur at the same time as other activities or overlap with other activities.
I'm trying to convert a series of cus…
-
The last couple of days demonstrated the risk being "exposed" to Nicehash where any attacker can gain access to absurd amount of hash power and 51% attack Graft at his own leisure.
Please consi…
-
So @cketti found the awesome concept for a K-9 rework using Material Design by @juliakorbut at http://julia.io/works/k-9/index.html
![](http://julia.io/works/k-9/images/k9_01.png)
(Only one of the scr…
-
```
ERC: 68
Title: web3.js contract object re-design
Status: Draft
Type: Informational
Created: 08.01.2016
Resolution: https://github.com/ethereum/web3.js
```
# Abstract
This proposal is a move to ma…