Avatar
Colby Serpa
59cacbd83ad5c54ad91dacf51a49c06e0bef730ac0e7c235a6f6fa29b9230f02
Merge fields, every discipline is a branch of nature… nature is the only industry.

I agree. We are going to open-source everything before we’re done and encourage everyone to contribute. The more manpower the better…

We’re just going to finish building a general-purpose base with our new merkle trees et al. so people can start build atop of it easily. It’s hard enough as is so hopefully this will guide the way.

RZKPoW 🌩️ — Solving the Vulnerabilities of SPV with Layer 1 ZKPs.

https://gist.github.com/ColbySerpa/767aff85632bbee772a40b912a892c2c

Replying to Avatar David King

Will he bring balance to the force?

“…photonic hardware used in hash protocols can also be used for other applications, i.e., the hardware is not necessarily an application-specific device.”

The more I think about it, the more it seems this quote is an extreme security risk… not a desirable feature like it seems.

The inability to reuse ASICs for anything other than mining raises the cost of attacking the network, because the attacker will be left with a bunch of near-useless paper weights (the ASICs).

Applying after I release the 🐝 whitepaper.