Sublime
An inspiration engine for ideas
Finally, I’d like to address the claim made by some critics that Bitcoin is a haven for bad behavior, for criminals and terrorists to transfer money anonymously with impunity. This is a myth, fostered mostly by sensationalistic press coverage and an incomplete understanding of the technology. Much like email, which is quite traceable, Bitcoin is... See more
Marc Andreessen • Why Bitcoin Matters | Andreessen Horowitz
Build for good actors, rather than hedge against the bad actors. I love Wikipedia’s Jimmy Wales‘ steak knives analogy. Imagine you’re designing a restaurant that serves steak. Subsequently, you’re going to be giving everyone steak knives. There’s always the possibility that people with knives will stab each other, but you won’t lock everyone in... See more
David • 99 Pieces of Unsolicited, (Possibly) Ungooglable Startup Advice
Working alongside @JustinMezzell and @alexisohanian on the new @digg, I find myself particularly focused on what I see as the defining challenge: the battleground for authenticity.
Put simply: How do we know who's real in a world of perfect AI mimicry?
Right now, we don't. And without... See more
Kevin Rosex.comAll technologies have the capacity to help or harm; blockchains are no different. The question is, how can we maximize the good while minimizing the bad?
Chris Dixon • Read Write Own: Building the Next Era of the Internet
Beaucoup de gens tiennent aujourd’hui pour acquis d’avoir accès à une protection aussi importante, mais le chiffrement est le fruit du long combat d’un groupe informel d’activistes, de cryptographes, de programmeurs et d’autres passionnés de technologie dans les années 1980 et 1990, qui croyaient fermement à la nécessité d’avoir une cryptographie
... See moreOlivier Roland • Tout Le Monde N'aura Pas La Chance De Quitter Son Pays
Proof of Humanity: Prove unique identity associated with each individual is necessary to protect against sybil attack.
Shrey Jain • On-chain identity landscape
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
amazon.com