Holographic storage for distributed applications -- a validating monotonic DHT "backed" by authoritative hashchains for data provenance (a Ceptr sub-project)
The cointoss algorithm represents a nice pattern for "trustable random initiation" in a distributed environment, i.e. how pick white/black for chess, or how we do rock/paper/scissors.
This is worthy at least of a blogpost maybe even a whitepaper if someone wants to do the litterature search to see what's been done before on this and if what we came up with here is actually a contribution.
The cointoss algorithm represents a nice pattern for "trustable random initiation" in a distributed environment, i.e. how pick white/black for chess, or how we do rock/paper/scissors.
This is worthy at least of a blogpost maybe even a whitepaper if someone wants to do the litterature search to see what's been done before on this and if what we came up with here is actually a contribution.