-
Linking an SSO identity to a Zoom PKI would be a good beginning step. However, this may not be enough.
One must also secure the "entry" to the meeting and strictly verify each participant in a non…
-
When I raised the question on IRC, I was wondering specifically if folks had more thoughts on the `zkp` part of your proposal. The usual bitcoin ZKCP example that gets thrown around is the [pay-for-su…
-
# Introduction
These are snippets I've collected while monitoring the Filecoin network communities.
### Reading List
https://beta.spec.filecoin.io/
-
# Bounty
TL;DR: privacy for the masses!
Leap network is an implementation of Plasma that provides a cheap, fast, secure, and efficient way to transfer ERC20 tokens and execute spending conditions.…
-
V and P refer to the participants of a zero-knowledge proofs. Consider give a more familiar name to this actors, Verifier/Prover, Victor/Peggy
-
# TLDR
The current argument for hack-style proposal against temporary variables is:
- Picking unique and meaningful names for the intermediate values is hard
- Unique and meaningful names for i…
-
## Problem with Signal
Signal has ***copious*** privacy issues making it unfit for privacytools.io endorsement.
1. Users are forced to supply a phone number to Signal (https://github.com/privacy…
ghost updated
3 years ago
-
## Recent thread [moved here (2020+)](https://github.com/ethereumclassic/ECIPs/issues/394)
---
lang: en
ecip: 1049
title: Change the ETC Proof of Work Algorithm to the Keccak-256
author: Alexande…
-
Nim currently has 3 types that are second-class citizens due to memory safety reasons: ``var T``, ``lent T``, ``openArray[T]``. These can only be used in parameter lists as the underlying implementati…
-
We've decided to use the bit vector revocation approach for MVP. [Past design discussions are here](https://github.com/digitalcredentials/docs/blob/main/credential/revoke_credential.md#past-design-dis…