-
## Properties of Money
- Durability
- Portability
- Divisibility
- Uniformity
- Limited supply
- Acceptability
## Credit vs Cash
Credit: Debt-based system
Cash: 'External' medium of exchange
…
-
Is there a feed to the content that is published on the site itself?
There's a feed to substack that hasn't been updated in a while and the substack itself seem to be gone from the web but I can't …
-
Rethink configuration:
Connect over SOCKS5 proxy.
Configuration -> Network -> enabled "Use all available networks (experimental)" and "Loopback (experimental)"
Configuration -> Network -> "Choose f…
-
In https://github.com/ROBERT-proximity-tracing/documents/blob/master/ROBERT-summary-EN.pdf it says:
"If the authority wants to do physical tracking, it will need to deploy sniffing devices"
This…
-
Gigablast is a good search engine, but there's a lack of options.
In fact, i've tried yacy (p2p search engine http://yacy.net/) but it's performance are really poor, but there's a lot of good optio…
-
Sorry for writing it here off-topic, but i don't have any other means to contact, so...
I've watched your great video, it's well made for those who are afraid onion networks and all that FUD around…
-
With HTLC transactions getting delayed confirming due to fee spikes and HTLCs sticking around too long causing force-closes, it may be worth at least having an API to do mempool scans for HTLC preimag…
-
Protocol improvement proposal which protects infected users against an adversary recording Bluetooth beacons.
- Each user generates an EC key pair (secp128r1) at regular intervals
- Broadcasted Bl…
-
Currently volatile.img is stored unencrypted and includes swap, which means that anyone compromising dom0 or getting past full disk encryption can potentially read things that were in application memo…
-
### Question
Hey everyone,
we're a small [open research group](https://social-protocols.org/) currently working on new comment ranking algorithms for discussion trees. Our goal is to make identify…