Sublime
An inspiration engine for ideas
Be aware there are malware programmes out there that are hunting for your private keys, and if you are connected to the internet, these programmes have the capability, in theory at least, to find and steal your private keys.
Tim Lea • Blockchain: Down The Rabbit Hole: (Discover The Power Of The Blockchain)
Miguel
@miguelferreira
The Cypherpunks used their mailing list to document various attempts at building an electronic coin network. This included “e-gold,” in 1996; an anti-spam proof-of-work algorithm called Hashcash by Adam Back; an anonymous proof-of-stake electronic cash network in 1998; and Bit Gold, a proof-of-work string of cryptographic hashes by Nick Szabo in 20... See more
Friends with Benefits (FWB) • A Political History of DAOs
the wild west of the internet
Alex Burns • 13 cards
If the “State is the monopoly on violence,” as Max Weber once defined it, then the surveillance state (or surveillance capital) is the monopoly on identity. In this time of rising surveillance capitalism, entrenched surveillance states and, more recently, the plutocracy of blockchain networks, this monopoly has never been more important to break. D... See more
Divya Siddarth • An Internet for Humans: Proof-of-Personhood Explained
Internet Resident
David Pennington • 4 cards
Brain Hacking
Matt Mower • 1 card

kevin
@dad