-
Freenet ( Combined and condensed )
Freenet played a large part in the initial stages of I2P's design. It showed what could be possible for a pseudonymous community that was completely contained wit…
-
Censorship resistance lists (crlists) are designed to prevent builders from censoring users in PBS. The design was originally put together with in-protocol PBS in mind. Can we adapt this solution to i…
-
## Simple Summary
Make smart contracts (e.g. dapps) accessible to non-ether users by allowing contracts to accept "[collect-calls](https://en.wikipedia.org/wiki/Collect_call)", paying for incoming ca…
-
That's a feature request from Kristof, specs still not there yet, but the current assumption it's about abuse, better option should be having the complaint filed through the DAO and the DAO should do …
-
The security of a protocol or of a deployment depends quite a lot on the security model at play.
The current deployment of nostr, and the current behavior of most of the clients, brings about the v…
-
I find some of the description of namespace consistency in GNS rather questionable, as the DNS suffers from the same observed aspects, but the text reads as if these characteristics were weak design o…
-
Idea: strongest possible reputation system by combining all existing science.
Problem: our scientists Rahim, Adele, Nitin and Dimitra did not combine their work.
Reason: optimal publication strategy …
-
How does peerbit make sure that a user can add a data record to the database, and make sure no one else removes it or modifies it? If i am not mistaken peerbit and orbitdb expects users to be trusted…
-
# Description
## Payout
General Prizes: Finalist 1-5 will receive an equal payout of the total winnings.
🏆 Finalist # 1: The Screaming Eagle Prize = 2000 ANT
🏆 Finalist # 2: The Almighty…
-