Most protocols prefer to be explicit, especially in terms of type info/field names; we resort to implicit protocols only where efficiency is paramount, e.g. TCP headers. But in a trustless protocol, implicitness can be desirable: it means fewer bits for an attacker to manipulate.
10:29 PM - 16 Mar 2019
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.