Conversation

Replying to
I did randomly drop into a couple of talks for like 10 min each today beyond the opening general audience talks, and damn the difficulty scales really fast. Every talk seems deep in the technical weeds of some esoteric topic silo that’s 80% different from the next one.
1
6
Beyond basic protocol level, this is not a tech “stack” in the traditional sense, and I suspect people from one small world will at best understand the innards of 1-2 adjacent ones. 3 hops away from your small world/well, it’s basically alien talk beyond basic shared elements.
1
6
Actually what it reminds me of is math, in terms of field structure. Except for a few people like Grothendieck who supposedly built mansions with vast swathes of math, most mathematicians can’t understand anything the mathematician in the next room does.
1
8
Above the basic “protocol” of say sophomore college STEM math (say calculus, stats, perhaps a bit of topology, real/complex analysis), it’s a Babel situation
2
6
Won’t tweet the obscenely large sandwich I had for dinner. Ordered fries too not realizing it came with chips. To my credit I only ate half. But I will share picture of this 75% chocolate bar that I’m eating a bit off for dessert. Came with hotel room. Speaker perk I’m guessing?
Image
1
11
Verdict: good chocolate. If you’ve never been an invited speaker at a nicer conference, be aware that there’s often a nice goodie bag waiting at the hotel. Conference I spoke at a few times in Chicago came with a nice cab of popcorn, jellybeans etc. Tomorrow I must swag hunt.
2
10
gn wagmi etc If you’re around, come to the meetup tomorrow if you can (linked up thread), or just say hello if you see me.
2
6
After fun breakfast chat, now catching back half of this panel on “notable security incidents since devcon V”
Image
1
3
Replying to
Panelist arguing that flash attacks are more in MEV bucket (miner extractable value) than hacks/security exploits. So software working as intended rather than bugs. Just in very inefficient markets. Though I’d argue algorithmic stablecoins are theoretically suspect too
1
3
Interesting distinction: DeFi is new classes of attacks, NFTs/consumer retail is simple, old attacks from 10y ago deployed against new classes of users. Commoditization curve of attacks?
1
3
Apparently the reality.eth module for gnosis safes are essentially superuser bots that can be easily exploited if misconfigured
1
7
Good stuff here. He won a bug bounty by white-hat stealing it from a honeypot safe set up by gnosis and then helping others defend. Takeaway: Configuration audits should be a thing
1
5
Next adventure. Standing in line for lunch. Opens in 20min but line is already like 50 people long. Yesterday pulled monarchial above-the-law privileges to cut to front of big line towards end to get us lunch. Today I shall get my lunch the democratic way.
Image
2
8
The more you go to conferences the more you’re willing to shamelessly put creature comforts — food, drink, bathrooms, breaks, naps, sneak outs, introvert retreats, wifi… above both water-cooler networking and attending sessions.
2
14
Vegetarian queue stalked waiting for new batch. I’m at front of it. Queue is not well marked so a lot of carnivores standing in wrong stalled line. Also lots of cutting in line and unauthorized forks and merges that would never be tolerated in my centralized monarchy 😤
1
6
I’ve noticed Latino cultures have thoughtful design intentions (queues, bathrooms, signage) but sloppy execution in the design of everyday things. Anglo cultures are the opposite: sloppy design, thoughtfully executed. East Asia is thoughtful on both, South Asia is sloppy on both.
5
23
Collected the minimum viable attendee swag on way back to hotel for nap time. Coffee, tote, large t-shirt in vitalik style. They were out of mediums. This is too big for me but had to take it. Maybe I’ll go to Hawaii 😆
Image
1
8
There seems to be tons of other booth swag available for those prepared to demonstrate Proof of Apparent Interest. I’m probably too old for that game. But maybe I’ll look to score a Proof of Genuine Interest thing or two.
1
4
Some big claims here I will have to dig into later. 🧐 Their mechanism opens up a lot of application design ideas, but breaks things like soulbound tokens and eth2 staking. Big claim is trustlessly transferring private keys.
2
4
Followed by evening meetup with a bunch of people… refactor camp alumni plus new faces. A few of us went to get tacos after. Verdict: as good as LA tacos 👍 And this endeth my Day 3.
Image
Image
3
9
Suricata reunion post-stroll photo. is attending devcon and will be around tomorrow if you want to connect. Suricata runs incubator programs/cohort based courses etc. for startups/scale-ups in Colombia and beyond. I did my breaking smart workshop for them in 2016
Image
2
6
Show replies