What’s up today?

Really love the new video. Very professional and easy to understand.

More like these please!

Just posted here for more exposure (hopefully):

13 Likes

Also if anyone fancies replying to this post by a Blockstack engineer, please do:

"Blockstack engineer here.

I think at a high-level the Maidsafe project has similar goals to Blockstack, but the implementations differ significantly.

Now, I’m only superficially aware of the inner workings of Maidsafe, so I can’t comment too deeply. But from what I can tell, Maidsafe and Blockstack differ in the following ways:

  • Blockstack tries to reuse as much of the legacy Web as possible, in order to leverage the high-bandwidth and professionally-maintained infrastructure it already sits on. For example, in Blockstack, you have the freedom to choose which storage system will host the primary replica of all of your data – i.e. it can be cloud storage, your personal server, a BitTorrent swarm, etc. All that Blockstack needs is for there to be a driver for it that lets it be accessed via HTTP(S). By contrast, Maidsafe is trying to build their own decentralized storage network that will automatically host replicas of your data.
  • Blockstack applications are Web applications in that they run in your unmodified Web browser and are built with existing Web frameworks, plus our blockstack.js library. By contrast, I think Maidsafe is trying to build their own browser. We might someday do this – there’s a spin-off company called New Internet Labs working on making a custom Blockstack browser for doing extra Blockstack-specific things, like managing your identities, whitelisting all application Web access to only go to your Gaia hub or Blockstack node, and making sure all application code is signed directly by the developer (TLS and DNSSEC be damned).
  • Blockstack uses a blockchain under the hood, but only to bind usernames to public keys and storage URLs (the Blockstack token is meant to power smart contracts, which should go live in Q4/2019 or Q1/2020). It isn’t affected by the (lack of) scalability of the blockchain because it can anchor many username registrations and updates to a single blockchain transaction, while replicating all the Blockstack-specific state to all Blockstack nodes. Everything else happens “off-chain” – i.e. via traditional Web protocols and software. But, your data is end-to-end signed and encrypted, and everyone who runs a Blockstack node has your public key already. By contrast, Maidsafe uses PARSEC to coordinate its storage network and I think they’re still working on a custom identity solution (but I could be wrong here).

Anyway, this is the limit of my understanding. Maybe a Maidsafe developer can jump in and elaborate?"

14 Likes

I’ve been a little busy on Reddit this evening. Time to call is a night:

7 Likes

I did a brief answer, hope that helps.

16 Likes

Itchy feet or getting ready for some wash trades?

2 Likes

A post was merged into an existing topic: Introduce yourself

Interesting thanks for sharing.

4 Likes
7 Likes

Amazing! Thank you David. Very helpful.

3 Likes

France as first country in EU apply new law to set special tax on links

2 Likes

India isn’t far away too https://tech.economictimes.indiatimes.com/news/internet/indian-govt-is-finalising-a-framework-to-tax-big-tech-firms/70457078

3 Likes
2 Likes

The FBI thing is actually scary. :fearful:

As i understand, it is a client server app.


It’s significant to have real dapp dex been inplemented on Safe net.

1 Like
1 Like

Apparently the first of august is WWW Day.

3 Likes

Here we have the perfect demographics for farmers, the zeitgeist is setting in haha:

5 Likes

Is it a fraud that I use the same method to receive BAT tokens? :smiley: I have some old android phones and have install the Brave browser on all of them…

hi
I’m new and I want to start up

3 Likes

Pretty amazing this, from 1985. Reads like it was written recently about two paths of digital transformation, one: surveillance leading to commercial and political manipulation, and the other… secure, private, verifiable interactions and financial transactions.

By David Chaum

https://www.chaum.com/publications/Security_Wthout_Identification.html

4 Likes