http://hyperledger.com/
With this nifty little tool one can manage pools that validate
transactions. So instead of a consortium of anonymous miners motivated
exclusively by profit you can trust a consortium selected according to a
predefined procedure.
Then if you trust the procedure, you can
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
___
cryptography mailing list
cryptography@randombit.net
This is the comsec dilemma. If a product or system becomes mainstream
it is more likely to be overtly and/or covertly compromised. If marginal it
is likely to be used by few and consequently not well tested against
overt and/or covert faults and compromise, may go out of of business,
or aquired
On 10 July 2014 22:39:01 CEST, John Young j...@pipeline.com wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
I think a lot of the stuff Silent Circle is doing looks great; but I think we
need a real open OS (perhaps
On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote:
This is the comsec dilemma. If a product or system becomes mainstream
it is more likely to be overtly and/or covertly compromised.
This is why it's important the client is open source, the binaries are
reproducible, and the
On Thu, Jul 10, 2014 at 10:52 PM, Tony Arcieri basc...@gmail.com wrote:
On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote:
This is the comsec dilemma. If a product or system becomes mainstream
it is more likely to be overtly and/or covertly compromised.
I don't find this a