Crypto Canon

5 stars based on 33 reviews

WTF is the blockchain? Bitcoin wiki nl twitter wonder how bitcoin and other cryptocurrencies actually work? How the bitcoin protocol actually works by Michael Nielsen http: Ethereum in 25 minutes by Vitalik Buterin https: How does Ethereum work, anyway?

Cryptographic hash function — what they are, properties of, etc. The idea of smart contracts by Nick Szabo http: Why bitcoin matters by Marc Andreessen https: Beyond the bitcoin bubble by Steven Johnson https: Bitcoin wiki nl twitter breakthrough in open network design by Chris Dixon https: Crypto tokens and the coming age of bitcoin wiki nl twitter innovation by Albert Wenger http: Fat protocols by Joel Monegro https: Bitcoin network effects by Elad Gil http: Why crypto tokens matter Fred Ehrsam and Chris Dixon https: What are cryptonetworks and why are tokens fundamental?

Money, blockchains, and social scalability by Nick Szabo http: Why decentralization matters — from eras of the internet to cryptonetworks by Chris Dixon https: The meaning of decentralization — but what does that actually mean? Quantifying decentralization — we must be able to measure blockchain decentralization before we can improve it by Balaji Srinivasan and Leland Lee https: The slow death of the firm by Nick Tomaino https: Vitalik Buterin, creator of Ethereum — Unchained: Mental models for understanding tokens Nick Tomaino and Chris Dixon https: Hard forks, soft forks, defaults, and coercion bitcoin wiki nl twitter illustrating fork types, benefits, addressing criticisms by Vitalik Buterin https: Governance deep dive — slides from Blockchain at Berkeley https: Blockchain governance — design components, approaches, suggestions by Fred Ehrsam https: Against on-chain governance — refuting and rebuking the above post by Vlad Zamfir https: Thoughts on governance and network effects Luke Duncan https: Notes on blockchain governance by Vitalik Buterin http: Privacy on the blockchain by Vitalik Buterin https: Securing smart contracts series — 6 Solidity vulnerabilities bitcoin wiki nl twitter how to avoid them from Loom https: Ethereum smart contract bitcoin wiki nl twitter practices by Bitcoin wiki nl twitter Diligence https: Platform currencies may soon be obsolete — here is my claim: What is the Lightning Network and how can it help bitcoin scale?

Ethereum scalability research and development subsidy programs by Vitalik Buterin https: Construction of a plasma chain 0x1 by David Knott https: Accounts, transactions, gas, and block gas limits in Ethereum by Hudson Jameson https: A proof of stake design philosophy by Vitalik Buterin https: Delegrated proof of stake: Features and tradeoffs by Myles Snider https: Tendermint; Tendermint BFT vs. Ethereum Casper by Jon Choi https: Inflation and participation in stake-based token protocols by Doug Petkanics bitcoin wiki nl twitter Making sense of cryptoeconomics — the term and the concept by Josh Stark https: A crash course in mechanism design for cryptoeconomic applications — understanding the basic fundamentals of cryptoeconomics from BlockChannel https: Cryptoasset valuations — a theory and framework for evaluating by Chris Burniske https: Comments on the above tweetstorm — network effects?

On value, velocity, and monetary theory — a new approach to cryptoasset valuations by Alex Evans https: Bitcoin wiki nl twitter the quantity theory of money for tokens — take bitcoin wiki nl twitter a former research officer at Federal Reserve Bank Minneapolis by Warren Weber https: On medium-of-exchange token valuations by Vitalik Buterin http: Understanding token velocity by Kyle Samani https: A process for evaluating new tokens by Nick Tomaino https: Token classification framework — a multi-dimensional tool for understanding and classifying crypto tokens by Thomas Euler http: Fat protocols are not an investment thesis by Jake Brukhman https: Skin-in-the-game coins by Ryan Selkis https: Thoughts on tokens by Balaji Srinivasan https: Funding the evolution of blockchains by Fred Ehrsam https: The bitcoin model for crowdfunding by Naval Ravikant https: How to make bonding curves for the economic web — a novel token distribution mechanism for building healthy communities, a technical primer by Slava Balasanov https: State of decentralized exchanges, by Nathan Sexer https: Networked liquidity — projects solving the chicken and egg problem by Radar Relay https: List of decentralized exchanges — of cryptocurrencies and tokens does not yet include column for degree of decentralization https: A holy grail in digital currency by Nick Tomaino https: An overview of stablecoins by Myles Snider https: The search for a stable cryptocurrency by Vitalik Buterin https: The emergence of cryptoeconomic primitives — definitions and building blocks of a token-based economy by Jacob Home https: Token lexicon — buzzwords related to curation markets and collectibles by Billy Rennekamp https: Introducing curation markets — trade popularity of memes and information with code!

Token-curated registries — a more formal but less-than-mathematical view of token-curated registries by Mike Goldin https: Smart media tokens from Steemit https: Rare pepe — what happens when you combine a crypto-asset with a meme and a trading card by Fred Wilson http: How to code your own cryptokitties-style game on Ethereum by James Martin Duffy https: Learning Solidity — commit-reveal voting by Karl Floersch https: Epicenter — a trove of interviews with many different blockchain project leads https: The Control — on the entrepreneurs, projects and protocols that are putting control of power in the hands of the people by 1confirmation https: Proof of Work — projects and progress in crypto, bitcoin wiki nl twitter a view from China by Eric Meltzer https: Cryptocurrency by Susan Athey and Kathryn Haun http: Advanced topics in computer science: Bitcoin and cryptocurrency technologies by Arvind Narayan http: A graduate course in applied cryptography by Dan Boneh and Victor Shoup http: Curation Markets, Bitcoin wiki nl twitter, Games The emergence of cryptoeconomic primitives — definitions and building blocks of a token-based economy by Jacob Home https:

Crypto tab mining website freeearn bitcoin in hindi urdu by gupta tube

  • Tabletsebook readersbitcoin shop for electronics

    Invitatii botez gemini texte damour

  • Maximum block size bitcoin stock

    Bot khoai tay tron sua

1 dogecoin to btc exchange

  • Lego mindstorms nxt 2.0 kit price

    Nanotechnology 2015 impact factor

  • Rainbow dash robotic wing

    Arnold schwarzenegger dogecoin cartoon

  • Bitcoin price predictions for the holidays and new year 2018

    Usb bitcoin miner australia post

Counterparty ethereum faucets

31 comments Reddit bitcoin tipping bot

Recombinant dna technology biology definition

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http: Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails.

Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines. If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.

In our experience it is always possible to find a custom solution for even the most seemingly difficult situations. If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.

Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. If you have any issues talk to WikiLeaks. We are the global experts in source protection — it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations. If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.

In particular, you should try to stick to your normal routine and behaviour. If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media. If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https: WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.

We specialise in strategic global publishing and large archives. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. See our Tor tab for more information. We also advise you to read our tips for sources before submitting.

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed. Today, September 7th , WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related manuals. A series of leaks on the U. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

How to contact WikiLeaks? Tips for Sources After Submitting. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.

Do not talk about your submission to others If you have any issues talk to WikiLeaks. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.

Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. Submit documents to WikiLeaks. Copy this address into your Tor browser.

Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key. Leaks News About Partners.