Sublime
An inspiration engine for ideas

Molly White • Blockchain-based systems are not what they say they are
Scott Kominers • Decentralized Identity: Your Reputation Travels With You - a16z crypto
Because Bitcoin is based on cryptography, each block of data that is created is sealed.
Tim Lea • Blockchain: Down The Rabbit Hole: (Discover The Power Of The Blockchain)
In fact the process can be swapped around, so that the private key is used for encrypting and the public key is used for decrypting. This mode of encryption is usually ignored because it offers no security. If Alice uses her private key to encrypt a message to Bob, then everybody can decrypt it because everybody has Alice’s public key. However, thi
... See moreSimon Singh • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
secure-secure meaning precisely that it is fragile and vulnerable enough to readily reveal tampering.
Matthew G. Kirschenbaum • Mechanisms: New Media and the Forensic Imagination (The MIT Press)
Everyone who needs access to data to perform their function has access. Everyone only has access to the data that they need to perform their function. Sensitive data, such as customer and prescription data, should be treated with extreme caution: highly restrict access, anonymize, and encrypt.
Carl Anderson • Creating a Data-Driven Organization: Practical Advice from the Trenches
In a peer-to-peer system, the same transfer would be much simpler