Sublime
An inspiration engine for ideas
as of early 2023, all Bitcoin miners combined execute about 280 hash functions every hour. They run a different hash function than HASH160, so their existing hardware can’t create collision attacks for it, but the existence of the Bitcoin network proves that collision attacks against 160-bit functions like HASH160 are practical. Bitcoin miners have
... See moreDavid A. Harding • Mastering Bitcoin
For reasons Satoshi Nakamoto never stated, the original version of Bitcoin made commitments to public keys by first hashing the key with SHA256 and then hashing that output with RIPEMD-160; this produced a 20-byte commitment to the public key.
David A. Harding • Mastering Bitcoin
Ben Horowitz explains the rise of crypto
youtube.com
Protocol updates;
> Any truffle user can register their agent on-chain
> Sybil proof using Truffle’s Secure Enclave
> Crypto degens can bet on Agents by staking behind them to earn rewards
Builder? Build useful agents & get paid
Degen? Bet on... See more


1/ An investigation into how Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) stole $243M from a single person last month in a highly sophisticated social engineering attack and my efforts which have helped lead to multiple arrests and millions frozen. https://t.co/dcY1e9xsPd




NEW: A DOGE staffer appears to be posting DOGE work on his public GitHub, as of this week. The staffer, Jordan Wick, also created a repository for a Twitter DM-downloading tool just 3 days ago. He posted work on geospatial data in Jan—undersea cables, ports & “critical minerals.” https://t.co/vtL7PZj6fJ


1/ Recently a team reached out to me for assistance after $1.3M was stolen from the treasury after malicious code had been pushed.
Unbeknownst to the team they had hired multiple DPRK IT workers as devs who were using fake identities.
I then uncovered 25+ crypto projects with related devs... See more