foresight-org / gitcoin-bounties

2 stars 0 forks source link

What's the most important computer security technology or strategy? #8

Open jdhodgkins opened 2 years ago

jdhodgkins commented 2 years ago

This bounty is to get your input on the Substack book and book club, Gaming the Future: Technologies for Intelligent Voluntary Cooperation by Allison Duettmann, Christine Peterson, Mark S. Miller, Foresight Institute.

What’s the book about: Have you ever played Civilization? In the game, you’re discovering technologies that unlock new levels, one capability at a time. But not all innovations are equal. Better technologies of cooperation could unlock new levels of progress across the board. Opportunities for bright futures enabled by bio, nano, and computing technologies are now within our reach. Their proliferation also comes with risks and authoritarian attempts at control. This book explores how cryptocommerce can enable decentralized, secure cooperation across human and computing entities. This unlocks a third path: a paretotropian future of high technology, intelligence and freedom.

What is this bounty about?

We would love your input to improve the ideas and technologies in the book. Each bounty in this series corresponds to one chapter. If we pick your submission, in addition to rewarding the bounty, we may get in touch to discuss if and how to include it in the book.

Submit your bounty-response below for your chance to be rewarded 0.15 ETH.

gitcoinbot commented 2 years ago

Issue Status: 1. Open 2. Started 3. Submitted 4. Done


This issue now has a funding of 0.15 ETH (488.79 USD @ $3258.61/ETH) attached to it.

cyber-bot commented 2 years ago

According to me, the most important Computer Security Strategy is encryption. Encryption allows your data to safely be stored or transported without the risk of it getting stolen. There are two types of encryption in widespread use today: symmetric and asymmetric encryption. The name derives from whether or not the same key is used for encryption and decryption. This is a Submmission for the Bug Bounty. Eth Address: 0xC543f9A0BFCaF6E393d56d59C042F49573e23f80

gitcoinbot commented 2 years ago

Issue Status: 1. Open 2. Started 3. Submitted 4. Done


Work for 0.15 ETH (466.18 USD @ $3107.84/ETH) has been submitted by:

  1. @cyber-bot

@jdhodgkins please take a look at the submitted work:


gitcoinbot commented 2 years ago

Issue Status: 1. Open 2. Started 3. Submitted 4. Done


Work has been started.

These users each claimed they can complete the work by 9 minutes from now. Please review their action plans below:

1) cyber-bot has started work.

According to me, the most important Computer Security Strategy is encryption. Encryption allows your data to safely be stored or transported without the risk of it getting stolen. 2) f1nv3rs3 has started work.

What is this bounty about?

We would love your input to improve the ideas and technologies in the book. Each bounty in this series corresponds to one chapter. If we pick your submission, in addition to rewarding the bounty, we may get in touch to discuss if and how to include it in the book. 3) okeaguugochukwu has started work.

I will make research and I've a perfect answer to it. 4) sammyhay has started work.

Create what will attract peoples attention 5) amoweolubusayo has started work.

Already started doing research as to how to stack up points for the documentation. 6) ify01 has started work.

I'm very much ready to share my thoughts and views on human cooperation 7) astadaniel2 has started work.

I will give the perfect answer . 8) joshmike2301 has started work.

I have the answer already , am a software engineer 9) ezeobi has started work.

am a software engineer with many years of experience. I will deliver. 10) ogwokalu has started work.

am data scientist, I know the best computer strategy 11) chibez has started work.

I'll provide ideas to improving cyber technologies in all environment

Learn more on the Gitcoin Issue Details page.

amoweolubusayo commented 2 years ago

What's the most important computer security technology or strategy?

In my opinion, strategy is more important than the technology. There are thousands of tools for computer security technology. How do you know the one to use without a strategy? Strategy is the basis for deciding to know the best technology to use. For example a secure strategy in blockchain is keep or hide or seed phrases to your wallet carefully. You need to know that first before you can decide if you would keep it in vaults(software/hardware). I strongly believe that strategy is most important.

Other improvements which I would suggest to the chapter

1)The first chapter : 0. START HERE: The Book & Book Club is a bit confusing. As a reader I wasn't sure if it's about technologies for intelligent voluntary cooperation or solely the Civilization game. I think additional contents to the summary will suffice. If it is more than the Civilization game, the summary could state that the book is starting from Civilization then moving to other games in the future. If it only about Civilization, the summary can priotize Civilization and make it clear that it's a game technology for intelligent voluntary cooperation. That way the first chapter which is the first impression will leave a long lasting understanding of the purpose of the book club.

2) The second chapter now considers Civilization as as a problem-solving superintelligence, this should have been more emphasized upon in the first chapter.

gitcoinbot commented 2 years ago

Issue Status: 1. Open 2. Started 3. Submitted 4. Done


Work for 0.15 ETH (167.47 USD @ $1116.47/ETH) has been submitted by:

  1. @cyber-bot
  2. @amoweolubusayo
  3. @okeaguugochukwu
  4. @astadaniel2
  5. @ify01
  6. @joshmike2301
  7. @ezeobi
  8. @ogwokalu
  9. @chibez

@aaronlongevity please take a look at the submitted work:


ImNotJahan commented 2 years ago

The most important factor in computer security is the awareness of the person using the computer. Most people compromise their security by accidently downloading a virus, which could be avoided if they knew how to spot them. Along with that, most people will use easy to crack passwords or reuse the same across sites, which are both easy ways to get all your accounts hacked.

Ethereum Address: 0xD5321a119eE2477C3682E625C0E5A41922c9d817