Advanced
Sort:
In reply to @drewf.eth
Dan Finlay@danfinlay
1 day ago

Or tell tailwind they should support both!

Dan Finlay@danfinlay
4 days ago

My feed is full of what appears to be damage control about a hypothetical outrage about state pruning that I see none of. That's an interesting phenomenon. Makes sense to me that storage isn't free/eternal.

In reply to @cosimojack.eth
Dan Finlay@danfinlay
4 days ago

Yeah I call that the holy trinity. Lots of ways to do it, and it's always great.

In reply to @grunt.eth
Dan Finlay@danfinlay
4 days ago

More importantly, even if some new token standard allowed this, that does nothing to prevent attackers from using an older standard. Token rejection must be at the user agent level, it can never be enforced in someone else’s memory.

In reply to @danfinlay
Dan Finlay@danfinlay
5 days ago

Oh, and you can do that pattern on MetaMask desktop today using the Push protocol snap for the notification, and wallet_watchAsset for adding the asset to the wallet. https://snaps.metamask.io/snap/npm/push-v1/

In reply to @grunt.eth
Dan Finlay@danfinlay
5 days ago

Ercs? You mean token? Let’s please not abbreviate erc-20 to erc 😅 I know it sounds crazy but what if rando tokens weren’t assumed to be detected by the wallet? Cuts off spam at the root, just requires an extra consent action to subscribe to notifications.

In reply to @0xdesigner.eth
Dan Finlay@danfinlay
5 days ago

Or what if you had to consent to participate?

Dan Finlay@danfinlay
5 days ago

It actually takes extra effort to *not* boil the ocean, so maybe work that into your metaphor lexicon.

In reply to @mmurthy
Dan Finlay@danfinlay
7 days ago

Agreed. Next time maybe consider using: https://github.com/danfinlay/eip712-codegen

Dan Finlay@danfinlay
7 days ago

https://x.com/danfinlay/status/1703466395584082342?s=46

In reply to @basche42.eth
Dan Finlay@danfinlay
7 days ago

Yeah I’m a long time fan of safe’s module system. I’d say their extensible contract account has been held back by a lack of an extensible wallet front-end to match it with, and snaps will let all of those SCWs explore a much higher velocity ecosystem.

In reply to @fits
Dan Finlay@danfinlay
7 days ago

Thanks!

Dan Finlay@danfinlay
10 days ago

I think @banklesshq this Friday is going to be good.

In reply to @mcoso.eth
Dan Finlay@danfinlay
11 days ago

I bet we could fill it with excellent content!

Dan Finlay@danfinlay
11 days ago

You can watch the talk by @m0nt0y4 at Permissionless premiering MetaMask Snaps here!: https://youtu.be/pnawbASw93Y?t=11641

Dan Finlay@danfinlay
12 days ago

I'll be celebrating the snaps launch on twitch here, going rogue/solo, inviting some people who helped make it all happen! https://www.twitch.tv/danfinlay3

Dan Finlay@danfinlay
12 days ago

How are you going to unlock an extensible protocol without an extensible client? https://x.com/MetaMask/status/1701585470512095636?s=20 If you have MetaMask extension installed today, check out snaps.metamask.io to install some new security providers & protocols!

Dan Finlay@danfinlay
12 days ago

How are you going to unlock an extensible protocol without an extensible client? https://x.com/MetaMask/status/1701585470512095636?s=20 If you have MetaMask extension installed today, check out snaps.metamask.io to install some new security providers & protocols!

In reply to @vitalik.eth
Dan Finlay@danfinlay
12 days ago

Had you given T Mobile any special recovery instructions? I understand they will accept them (like a special password to provide to reset). Am curious if the social engineering bypassed any special notes.

In reply to @boscolo.eth
Dan Finlay@danfinlay
14 days ago

Oh I think it’s fundamentally flawed to initiate every interaction by disclosing your entire portfolio, and everyone is racing to reinvent that mistake the hardest.

Dan Finlay@danfinlay
15 days ago

I understand there’s a movement to refer to a cocktail composed of four equal parts as “perfect”, and I’d like to publicly advise against depriving a domain of its craft with this kind of verbiage. That is all.

In reply to @m0nt0y4
Dan Finlay@danfinlay
16 days ago

Delegations do give you a way to share funds between wallets without exchanging keys, but doesn’t solve the issue for EOAs. For EOAs we need a new protocol change like EIP 3074 or EIP 5003.

In reply to @dwr.eth
Dan Finlay@danfinlay
16 days ago

I didn’t see another approach that addressed the need for users to be able to have authority over their own account authorization upgrade policy. Plus it even works for eoas. So it seems like the simplest fully baked SBT proposal imo.