RT @austinhill: The Dawn of Trustworthy Computing by @NickSzabo4 http://unenumerated.blogspot.ca/2014/12/the-dawn-of-trustworthy-computing.html … << a MUST-read for anybody active in this space
-
-
Replying to @gendal
@gendal@tek_fin@austinhill@NickSzabo4 another part of the puzzle:a perfect but flexible distributed authentication scheme at endpoints2 replies 0 retweets 2 likes -
Replying to @jlleleu
@jlleleu Dr Stefan Brands scnhoor based private ID credentials are important for this@gendal@tek_fin@NickSzabo44 replies 1 retweet 2 likes -
Replying to @austinhill
@austinhill@jlleleu@gendal@tek_fin The crypto is easy. Making it Sybil-proof is laborious expensive wet work: local & insecure.3 replies 0 retweets 3 likes -
Replying to @NickSzabo4
@NickSzabo4@austinhill@gendal@tek_fin 3/ID rely on a secure chain or trust- although likely performance issue on the server side for now1 reply 0 retweets 0 likes -
Replying to @jlleleu
@jlleleu@austinhill@gendal@tek_fin Issue not computer perf, it is imposing ignorant constraints on who/how/when users can trust.1 reply 0 retweets 0 likes -
Replying to @NickSzabo4
@NickSzabo4@austinhill@gendal@tek_fin token-rights for actions/crypto-associated to the ID-based on rating derived from a chain of trust1 reply 0 retweets 2 likes
@jlleleu @austinhill @gendal @tek_fin People don't trust in chains. This is anti-user techno-gibberish.
-
-
Replying to @NickSzabo4
@NickSzabo4@austinhill@gendal@tek_fin chain of trust is formal ie struct. can easily include combination of well known trusted parties0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.