RT @austinhill: The Dawn of Trustworthy Computing by @NickSzabo4 http://unenumerated.blogspot.ca/2014/12/the-dawn-of-trustworthy-computing.html … << a MUST-read for anybody active in this space
-
-
@NickSzabo4@austinhill@gendal@tek_fin 3/ID rely on a secure chain or trust- although likely performance issue on the server side for now -
@jlleleu@austinhill@gendal@tek_fin Issue not computer perf, it is imposing ignorant constraints on who/how/when users can trust. -
@NickSzabo4@austinhill@gendal@tek_fin token-rights for actions/crypto-associated to the ID-based on rating derived from a chain of trust -
@jlleleu@austinhill@gendal@tek_fin People don't trust in chains. This is anti-user techno-gibberish. -
@NickSzabo4@austinhill@gendal@tek_fin chain of trust is formal ie struct. can easily include combination of well known trusted parties
End of conversation
New conversation -
-
-
@NickSzabo4@austinhill@gendal@tek_fin 2/ Public/Private ID verifiers in blockchain and a software prover at the endpoint (hardware Free)Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@NickSzabo4@austinhill@gendal@tek_fin 1/there is a "fully secure against malicious adversary" way to do it,although crypto is not trivialThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.