Looking for crucial informal human processes is mainly valuable for answering what shouldn’t protocolized. Tons of people tried to layer I2P onto file sharing protocols (see iMule), but most didn’t actually want slower speeds for greater anonymity.
-
-
To be clear I think some of the use cases and ideas you laid out are pretty good, I just take issue with the implementation. Building new stuff like this is hard enough. Why waste time and resources also recreating what Bitcoin has already done in security and network effect?
-
Thanks! I have further thoughts, but this is probably a good stopping point. Appreciate the input :)
End of conversation
New conversation -
-
-
I challenge you to find any good technical reason that implementation of a *scalable* model is easier on some other chain or meta token. And then what does it offer over a BTC version? A more obvious way for the devs to extract wealth is not a consumer advantage.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.