Sublime
An inspiration engine for ideas
Rather than storing a memorized secret like a password, users can apply public key cryptography to sign up, access sites, and take sensitive actions by using private keys to deterministically prove ownership of a represented account on a shared ledger. It may sound like voodoo to the average person, but it is a bit like electricity. Flip a switch, ... See more
Reed McGinley-Stempel • Web3 and the future of data portability: Rethinking user experiences and incentives on the internet - Help Net Security
Nick
@pickles

Aragolas
@not
seamless integration of the abstract technology behind blockchain and the real-world implications such as ownership details and product history.
Tim Lea • Blockchain: Down The Rabbit Hole: (Discover The Power Of The Blockchain)
Asset owners (or custodians) generate private keys, sign messages indicating asset transfer, and then broadcast those messages to the public so that the world can verify the scarce asset hasn’t been double spent. Each private key is tied to a public key. Where KYC/AML are necessary, public keys can be mapped to some off-chain identity system (e.g. ... See more
Kyle Samani • $100 Trillion
Ibraheem Firaz
@ibigeem