Really love the new video. Very professional and easy to understand.
More like these please!
Just posted here for more exposure (hopefully):
Really love the new video. Very professional and easy to understand.
More like these please!
Just posted here for more exposure (hopefully):
Also if anyone fancies replying to this post by a Blockstack engineer, please do:
"Blockstack engineer here.
I think at a high-level the Maidsafe project has similar goals to Blockstack, but the implementations differ significantly.
Now, I’m only superficially aware of the inner workings of Maidsafe, so I can’t comment too deeply. But from what I can tell, Maidsafe and Blockstack differ in the following ways:
Anyway, this is the limit of my understanding. Maybe a Maidsafe developer can jump in and elaborate?"
https://www.reddit.com/r/blockstack/comments/cf6gxi/blockstack_difference_to_maidsafe_safe_network/
I’ve been a little busy on Reddit this evening. Time to call is a night:
https://www.reddit.com/r/computers/comments/cjgn88/what_is_the_perpetual_web_the_future_of_history/
I did a brief answer, hope that helps.
Itchy feet or getting ready for some wash trades?
Interesting thanks for sharing.
Amazing! Thank you David. Very helpful.
India isn’t far away too https://tech.economictimes.indiatimes.com/news/internet/indian-govt-is-finalising-a-framework-to-tax-big-tech-firms/70457078
The FBI thing is actually scary.
As i understand, it is a client server app.
It’s significant to have real dapp dex been inplemented on Safe net.
Apparently the first of august is WWW Day.
Here we have the perfect demographics for farmers, the zeitgeist is setting in haha:
Is it a fraud that I use the same method to receive BAT tokens? I have some old android phones and have install the Brave browser on all of them…
hi
I’m new and I want to start up
Pretty amazing this, from 1985. Reads like it was written recently about two paths of digital transformation, one: surveillance leading to commercial and political manipulation, and the other… secure, private, verifiable interactions and financial transactions.
By David Chaum
https://www.chaum.com/publications/Security_Wthout_Identification.html