-
Questions about KERI:
1. [What is the legal status of what you do with KERI, how does it meet regulations and law?](https://github.com/WebOfTrust/WOT-terms/issues/159#issuecomment-2143984083)
2. […
-
Tail emissions within XMR are an enormous game theoretic concept that we don't see in other (major) cryptocurrencies. However, there's no game theoretic paper that's been formally peer reviewed within…
-
**Description**
Datum ID is a self-sovereign identity app for users to sign in to decentralized apps and manage their data sharing with these dapps. When users download the app, they are asked to v…
-
Just a brain dump based on questions I have about SamOS.
----------------------------
What's the simplest story around SamOS?
1. You've created your DID
2. You can move to any website or web…
-
## Overview
The Internet Computer implements a novel threshold ECDSA (tECDSA) protocol to produce chain-key signatures. In this protocol, the private ECDSA key is held in a secret-shared manner by …
-
Topic is determined: Digital Basic identity, see https://www.tweedekamer.nl/kamerstukken/brieven_regering/detail?id=2021Z02985&did=2021D06488
Estimated timeline (tentative)
- 2 _weeks_: read back…
-
## Introduction
As a required deliverable of the Moonlight product offering, we are implementing a self-sovereign identity solution. This implementation uses a hybrid on-chain/off-chain approach to i…
-
**Description**
Datum ID is a self-sovereign identity app for users to sign in to decentralized apps and manage their data sharing with these dapps. When users download the app, they are asked to v…
-
Hi!
I'm building [a free software project](https://gitlab.com/papiris/ml-predator-control-thesis) to offer predator alerts and deterrence for farms, using NVR and zero-trust, overlay mesh networkin…
ruzko updated
2 months ago
-
> 👋 If you are interested in working on this issue, please check out the [Getting Started guide on HackerEarth](https://www.hackerearth.com/challenges/hackathon/flip-fest/custom-tab/getting-st…