An education site documenting the development of ZK-rollups on Bitcoin.
Bitcoin Treasuries in Publicly Traded and Private entities - List of large holders
A week after losing millions to an 'address poisoning' scam, over half of the funds have been returned to the victim’s Ethereum address.
Justine Bone, a cybersecurity firebrand whose research led to recalls of half a million faulty pacemakers, leads the soon-to-launch information-sharing and analysis center (ISAC) for crypto firms.
Logos, a decentralized and privacy-focused technology stack, inscribed its manifesto on the largest-ever Bitcoin block today.
"the rules of the chambers are fantastically abstruse"
Proceeds will go to fund the development of Bitcoin layer-2 lightning startup Tirrel Corp.
Lawmakers in the European Parliament pass anti-money laundering rules in ‘loss of privacy’ for crypto.
Damian Williams, the United States Attorney for the Southern District of New York; Thomas Fattorusso, the Special Agent in Charge of the New York Field Office of the Internal Revenue Service, Criminal Investigation (“IRS-CI”); and James Smith, the Assistant Director in Charge of the New York Field O...
Depositors were originally told that bridged ether would be returned once the bridging phase was over.
I want to share a DSL I am building for describing and running bitcoin contracts. It is not another effort to write Script in a higher level language. 😅 Instead, the DSL is a tool for describing transactions, sending them to bitcoin node, and running assertions on the state of the system - using ...
Our story about how a Bitcoin mine in Texas infuriated its neighbours is about more than just the noise.
A Tale of Two Devices, Task Stacking, But Is It Really Reading? Plus: The Cigar Rollers’ Pastime
DePIN involves taking real-world infrastructure like a wireless network and running it with a blockchain-powered system. VCs are salivating, but there aren't many customers yet.
An archaeologist, anthropologist, and film expert examine the immense damage to cultural heritage caused by Russia’s war on Ukraine.
A new book published by Hong Kong’s Blacksmith Books features images of Chongqing shot by war correspondent Melville Jacoby that paint a picture of life in China’s temporary capital on the Yangtze.
I didn’t want to add my voice to the cacophony of hot takes about the xz backdoor incident because I’m sure many people are already sick of hearing about it. However, there is something…
Android 15 is adding a new location privacy feature that can block location requests from carriers for non-emergency use cases.
You could buy a pixel 3 or even lower with the lowest storage possible to run lineageos to test if it suits your needs
- You want to experience a piece of technology you couldn't afford/were too young for
- You have backups of delisted apps that you want to use
- You want to create homebrew
Yes in fact it has happened in this very same country https://en.wikipedia.org/wiki/Supreme_Council_for_the_Restoration_of_Democracy
Yeah but there would be consequences and a few dissenting votes wouldn't change the predetermined outcome but would probably come at the risk of harm of yourself and your family
no the site just doesn't have that many users
I get that and I'm saying it's available to use rn for you to dissect and I feel like if you have such strong opinions about it the very least you could do is put your money where you mouth is and test out the network and outline all it's flaws so the community can reason about it instead of going hurr durr it's bad I hate it
They make extremely strong claims, and strong claims require strong proof. I do not see such proof anywhere. What I see is that they play fast and loose with website visitor privacy and seem to focus mainly on token hyping.
All the claims against tor and i2p are discussed in numerous academic papers and are acknowledged by the developers themselves not sure about the other projects putting that aside the network is in production rn so you could always test it and do a full writeup on all the flaws for everyone to see and discuss.Telling persons why they've decided to use tokens and not rely on pure altruism is not token hyping.
so you gonna comment on their comparison or nah?
This is “privacy for the rich” model. Unsurprisingly: poor people can’t push the token to the moon! And looking at their website it is clear they focus more on hyping the token than on actual privacy.
"Tokens will be used to reward those who put stake into the Nym ecosystem by providing services, such as operating a mixnode or validators for the Nym blockchain. Users discover service providers and attributes a service provider needs. Users may pay service providers outside of Nym directly. Alternatively, users may pay the mixnet fees directly or services may pay for or stake NYM tokens on behalf of a pool of users in order to provide services without cost to users."
It’s fascinating how they talk down Tor (“because Tor does not add timing obfuscation or cover traffic to obscure the traffic patterns in circuits”), but fail to mention i2p which solves these issues without the need for bollockschain tokens. Makes sense — Nym seems to basically be i2p with a blockchain token bolted onto it so that it can become an investment vehicle.So either they did not know about i2p, an important and reasonably well known project which has been around for almost 20 years and is very clearly in the same problem space, or they intentionally decided not to mention it because it would make them look bad. Take your pick: are they ignorant, or disingenuous? Either is a great trait for a project that aims at protecting privacy from the NSA, no less.
" I2P (‘Invisible Internet Project’) replaces Tor’s directory authority with a distributed hash table for routing. How to design a secure and private distributed hash table is still an open research question, and I2P is open to a number of attacks that isolate, misdirect, or deanonymize users. Like Tor, I2P is based on ‘security by obscurity’, where it is assumed that no adversary can watch the entire network. While security by obscurity may have been cutting-edge at the turn of the millennium, such an approach is rapidly showing its age.Nym’s cutting-edge mixnet design guarantees network anonymity and resistance to surveillance even in the face of powerful deanonymizing attacks. Unlike I2P, Nym adds decoy traffic and timing obfuscation. Rather than a centralized directory authority or distributed hash table, Nym uses blockchain technology and economic incentives to decentralize its network.The Nym mixnet can anonymize metadata even against government agencies or private companies who can monitor network links and observe the incoming and outgoing traffic of all clients and servers." Source: https://get3xnymtech.net/docs/stable/overview/index.html. Full in depth blog post comparing it against tor, vpns , i2p and other solutions in the space https://blog.nymtech.net/vpns-tor-i2p-how-does-nym-compare-8576824617b8
Can you at least read their whitepaper and make a fully informed decision instead of hoping for their downfall
Why would anyone want any hegemon at all? No to China No to US No to any other world power