Probably 15 ico's… 😉
— Bart Suichies (@bsuichies) February 17, 2018
We just passed 700 lightning nodes on mainnet serving 1,700 open channels. 👏 Instant, free and trust-less transactions are here and it is just the beginning. The resemblance this has with our universe is mind-blowing . 🤯👇⚡️🚀🌌 #LightningNetwork #bitcoin #segwit pic.twitter.com/AM8z7geyNR
— Armin van Bitcoin ⚡ (@ArminVanBitcoin) February 14, 2018
Bad web experience leads to our culture of outrage and clickbait articles, which leads us to elect extreme viewpoint leaders with outrageous ideas not based on facts.
— alex van de sande (@avsa) February 14, 2018
There is no such thing as fully trustless tech. In encryption you trust that your recipient won't forward your message. In blockchains people who don't read the code are trusting software upgrades. Reducing needed trust lowers governance costs & increases social scalability.
— Nick Szabo⚡️ (@NickSzabo4) February 13, 2018
TNO approved as Sovrin steward. Very cool to see this famous Dutch institute (Netherlands Organisation for Applied Scientific Research) partnering up with the most promising platform for self-sovereign identity – and @OVioHQ investment – @SovrinIDhttps://t.co/AJxx6wh6Rm
— Aron van Ammers (@aronvanammers) February 13, 2018
We specialize at creating #CryptoGraphics: simplified visual representations of complex #Blockchain-related technology. Curious about things like Consensus Systems, or perhaps want to grasp the fundamentals of the Lightning Network? Check out or work! https://t.co/tdZFA4QOBC
— CryptoGraphics (@CryptoGfx) February 13, 2018
Presenting “Payments” per day, a more accurate representation of real economic activity on the Bitcoin network.
(It’s a count of all outputs that are not change outputs back to the sender)https://t.co/kyuTMXz09A
— Sergej Kotliar (@ziggamon) February 11, 2018
At a bank trying to prove my address:
CLERK: "We have a discrepancy here… Your name here is Jani Eväkallio but this proof of address says Evakallio without the dots. Can you explain that?"
ME: "How much do you know about Unicode?"
I don't think I'm getting a bank account today
— Jani Eväkallio (@jevakallio) February 8, 2018
'Security protocols always consist of at least two layers: a "dry layer" that can be analyzed by … objective mathematics … and a "wet layer" that consists of the often unpredictable … motivations of the protocols' users.'https://t.co/bQjziUhNHQ
— Nick Szabo⚡️ (@NickSzabo4) February 9, 2018