-
Hello, I've heard about this amazing project and its goal to increase entropy for a stronger security. I've developed recently after a long road (3-4 years) of personal research a formula that might b…
-
Here's a scenario:
I have two different accounts, each with different trust network. Each network shares no users at 0th position. I would be able to spend my full issuance on each account, giving …
-
I'm really excited to be learning HHS, as I can see a lot of great, very intelligent, work has gone into it already. From reading the documentation it sounds like it will work for the app I'm buildin…
-
There is some language in the requirements around retrying a corroboration, but it is so far limited to the following (paraphrasing):
> A retry of validation on a single perspective is not allowed.…
-
Sometimes on the orderbook you see a few different makers all with the same minsize and maxsize. What's probably happening is somebody is running more than one instance of yield generator from the sam…
-
Leave below as comments your memos that grapple with the topic of cyber inspired by the readings, movies & novels (at least one per quarter), your research, experiences, and imagination! Also add a th…
-
**The problem you're addressing (if any)**
The NetVM is exposed to a wide variety of attacks, and it's the first line of defense in hostile local network environments. (e.g there is evidence certain …
-
It's not an issue per se, it was a design decision, however it may be worth to discuss one more time.
Grin node periodically kills the excess of connections https://github.com/mimblewimble/grin/blo…
-
-
Reply with your memo as a Comment. The memo should be responsive to this week's readings on Policy & Government from Governor Jerry Brown, with 300–500 words + 1 visual element (e.g., figure, image,…