— Bart Suichies (@bsuichies) August 15, 2018
As a result, we were able to generate "valid" attestation quotes. Using these counterfeit quotes, successfully "proved" to a remote party that a "genuine" enclave was running while, in fact, the code was running outside of SGX, under our complete control. https://t.co/94ZCsiT9us
— Xiao Wang (@XiaoWan59867710) August 14, 2018
I tried double spending an unconfirmed transaction on bcash. I thought I'd give it 10 minutes, trying 2 conflicting transactions on my own address to see if I could reliably propagate a double spend. I used a higher fee on the later tx. And the later tx was the one that confirmed pic.twitter.com/yUEy9zbYs1
— Alex Bosworth ☇ (@alexbosworth) August 10, 2018
When making something new that clearly competes with something that exists, gravity will pull you towards trying to do everything they do PLUS the new stuff you want to do. I’d encourage you steer clear of feature parity. Instead, handle common struggles in novel, unique ways.
— Jason Fried (@jasonfried) August 10, 2018
Why did platform monopolies built on open protocols take over the web? Services came along that created a better user experience by addressing the challenges of discovering content, preventing spam, and generating revenue for the provider (by monetizing user data). Others?
— Jay Graber (@arcalinea) August 9, 2018
1) When is your transformation 'done' and successful?
2) How digitally mature is your organisation right now?
3) If you can't answer 1 or 2, how do you drive (and measure) progress?
— Bart Suichies (@bsuichies) August 1, 2018
A walk through of details of how India’s #Aadhaar digital identity system is so flawed. The key problem is identifiers and the proof of their authenticity MUST be kept separate from authorization. The W3C DID architecture does this in a non-centralized way under user control. https://t.co/UJJJs46yO6
— Christopher Allen (@ChristopherA) July 29, 2018