These are the final colors (and the logo was slightly tweaked), there will be no further updates to Q’s branding for the foreseeable future. Pepe away! 🐸
Notes with ADP ensures Apple cannot at any point access them. Password-locked notes are encrypted via key derivation of the pw, and Apple similarly cannot access them either. W/ ADP enabled, I believe the pw-locked notes remain encrypted w/ the same KD process, but additionally are encrypted w/ ADP when synchronized.
It's very hard to add after the fact – I spent six years working on Quilibrium's design because of that – in order to add holistic privacy and security features to an existing network, it would necessarily involve a hard fork, and may also require substantial redesign of execution due to the performance tradeoffs.
Yep, to be clear, this is utilizing webauthn under the hood, saving the seed phrase as a largeBlob. LargeBlob support requires an enclave that issues two keys: one for the webauthn credential (which is unused because most providers don't support secp256k1), and a corresponding largeBlob key to enc/decrypt the blob.
I’m amused because now they’re doing the same scrambled text I did (a previous iteration did not have this). Their litepaper is light on details about how they make this work but notably there is no holistic solution involved for privacy, & zero fee sharing with the sources of the data which trained the model
Considering both of my partners are guys that would be hilarious, but no, they’re doing V and Johnny Silverhand
Not anime, but my partners and I are doing a Cyberpunk 2077 cosplay, I’m specifically going as Evelyn Parker:
IPFS is the common route for web apps, managing updates on chain can point to the latest version. A truly holistic solution requires rebuilding the internet from scratch, which I hear some people are working on 😉
Not that complicated: - you have to trust cloud providers aren't handing off the access keys when demanded - zero days exist and get leveraged to obtain access even if you do trust providers - many companies have long tails of allocated resources at providers that they do not use or even know what they're there for
Depends on the nature of how you want membership to work — do you want it to be exclusively casts available only to people who are in the group, or one where any prior/future members can see/post?
It’s very amusing as an outside observer seeing the overlap of populist tribal behaviors on “both sides”. It feels like a systemic reaction to the above consolidation of power in progress, but without an understanding of the conditions that produced it or a solution that can meaningfully advance from it.
https://unherd.com/2023/09/capitalism-is-dead-long-live-technofeudalism/ “If each of us is to reclaim ownership of our individual minds, we need to collectively take ownership of cloud capital, instead of submitting to a few feudal overlords.” I wonder who’s working on that? 🤔
Channels are technically permissionless, so if you made posts to one that Warpcast doesn’t track you’d be able to do so without having to worry about a bunch of encrypted data appearing in Warpcast and confusing folks, but I’d highly encourage adding a proposal to the direct casts FIP or even a separate one.
It isn't typically, but there are plenty of cases where inexperienced founders end up in a down round, which they could have perhaps avoided by taking less capital in the prior round and using said capital with a greater degree of thrift
Totally, I'm not arguing why we need privacy, I'm arguing we shouldn't make it _opt-in_.
I don't think about wallets, I think about browsers. I don't think about a distributed ledger, I think about operating systems and databases. This isn't 50 years away. This is happening right now. It's time to transcend to a new web.
This is my vision for the future of crypto. It's not a geeky 8088 breadboard you interact with via a PS/2 keyboard and tap some BASIC into. It's _the web_. You use your browser. You don't use a wallet. You use TLS, interacting with an MPC protocol that handles TLS frames to transparently operate with the underlying net