21 Million is Non-Negotiable
“Distorting supply only serves to distort a currency’s ability to perform its job of storing and communicating value; it can’t make a currency more valuable or secure.” – Phil Geiger
Read More“Distorting supply only serves to distort a currency’s ability to perform its job of storing and communicating value; it can’t make a currency more valuable or secure.” – Phil Geiger
Read More“ION will decentralize the way that messages and application data is encrypted and exchanged.” – ION Announcement
Read MoreA follow-up to yesterday’s incredible read from The Nakamoto Institute by Ian Grigg, The 7 Layers of Financial Cryptography. Today we dig into what the reality of financial cryptographic systems as they have been developed & secured through Bitcoin. What philosophy and mentality informed it all, and where did it differ from Ian’s vision, and where was he able to see what would come about?
Read More“Make no mistake: the EARN IT Act is a vehicle to undermine end-to-end encryption.” – Elliot Harmon
Read More“For the better part of the last decade, the combination of these two practices has given rise to an increasing number of SIM swap attacks ending in the theft of bitcoin and other cryptocurrencies.” – David Hollerith
Read More“It is therefore a universal truth that all work has a measurable cost of energy transformation due to the very nature of the universe, and the laws of thermodynamics. It is with these laws that we underpin Bitcoin’s Proof-of-Work.” – Rory Highside
Read MoreIs it the miners? The developers? The nodes? Who really defines Bitcoin, who establishes the rules that make it immutable, secures it against unwanted change, and determines the protocol that distinguish a random integer, from a true Bitcoin integer?
Read MoreRecently, a bit of Twitter drama has arisen from a post that started with @JWWeatherman’s disclosure of a perceived critical bug in the Casa Node device. Today, to start off a discussion of home network security, what self-signed certificates do/don’t guarantee, and the general trade-offs between security and usability, we read @CasaHODL’s blog post responding to JW’s concerns, and then we get Guy’s take on this as a Casa Node user.
Read More“Auditing controls might fairly be called the security protocols of capitalism… [but] auditing is in deep conflict with efforts towards greater privacy.” –Nick Szabo
Read More“What we’re witnessing with digital assets is a move back toward bearer assets — now that users of these protocols have figured out how to trade them quickly, digitally, and without any possibility for the types of errors that lead to costly reconciliation processes.” – Fidelity Digital Assets
Read MoreTo receive ongoing updates and notifications on new episodes, please sign up to our Newsletter and we’ll make sure to keep you in the loop!
Tusant is a powerful WordPress theme for podcast & music streaming.
Alone, and feel the charm of existence in of souls like mine. I am so happy, my dear friend.
Recent Comments