Cryptography
Search documents
X @mert | helius.dev
mert | helius.dev· 2025-10-31 20:53
Core Idea - The Cypherpunks' vision of individual freedom through code and cryptography is being realized [1] - Encrypted, unruggable money represents the final step in achieving this freedom [1] Technological Implementation - The initial focus was on encrypting text and data on the internet [1]
X @mert | helius.dev
mert | helius.dev· 2025-10-31 12:04
you physically can not get more PvE than privacyindividuals > institutionscryptography > corruptionzillions > trillions ...
X @mert | helius.dev
mert | helius.dev· 2025-10-31 10:43
like mfer what do you think the literal crypto in "crypto" stands for?what exactly do you think the word cypherpunk even means?do you understand that the entire point of the movement was privacy?individual rights gained via cryptography?this is as lindy as it gets ...
X @mert | helius.dev
mert | helius.dev· 2025-10-26 17:07
RT lucid.⛩️ (@lucidzk)this is what happens when a technology is built on first principles. privacy, freedom, individual sovereignty and not made up hype cycles.capital markets make the rest obvious: why wouldn’t you accumulate the asset of a system that literally enforces freedom cryptographically!? ...
How Google's quantum breakthrough could disrupt AI, cryptography, and global tech
Invezz· 2025-10-23 13:22
Core Insights - Google has achieved a significant milestone in quantum computing, which is expected to drastically reduce the time required for certain computational tasks from thousands of years to a much shorter duration [1] Group 1: Company Developments - The announcement of the quantum computing breakthrough positions Google as a leader in the tech industry, potentially reshaping the competitive landscape [1] - This advancement may lead to new applications and innovations across various sectors, including finance, healthcare, and logistics [1] Group 2: Industry Impact - The development is likely to send shockwaves through the technology stack, prompting other companies to accelerate their own quantum computing initiatives [1] - The implications of this technology could redefine computational capabilities, influencing how industries approach complex problem-solving [1]
X @Cointelegraph
Cointelegraph· 2025-10-22 12:30
Could BTE be the cryptographic key to ending frontrunning forever?Deep dive below.https://t.co/Erhhy1mM5b ...
X @Nick Szabo
Nick Szabo· 2025-10-21 06:56
Bitcoin Security Vulnerabilities - The report identifies Bitcoin's core vulnerability not in the protocol itself, but in the concentration of control among a small group of publicly identified core maintainers [1] - The maintainers' known sponsors and location within three-letter agency jurisdictions raise concerns [1] - The report draws a parallel to Project Veritas, highlighting the speed at which an organization can be compromised [2] Codebase Complexity and Review Process - Bitcoin's codebase, consisting of 300,000-400,000 lines of C++, requires expertise in 8+ disciplines for proper review [2] - Individual maintainers review code based on their strengths, trusting others in different areas, which may lead to oversight [2] - The codebase's complexity exceeds human cognitive capacity, making it impossible for any single reviewer to trace all execution paths and spot edge cases [3] - A single consensus change can affect 15+ subsystems across 50,000 lines of interdependent code [3] Proposed Solutions - Radical codebase simplification is necessary to improve security [4] - Multiple competing implementations of Bitcoin should be encouraged [4] - Broader geographic and jurisdictional diversity among contributors is needed [4] - Anonymous contributors should be allowed where possible [4] Shifting Security Assumptions - Bitcoin's security model assumes adversarial nodes, but the report suggests the need to update this assumption to account for potentially adversarial maintainers [5] - Sovereign node operation is recommended [5]
X @Ansem
Ansem 🧸💸· 2025-10-21 05:29
RT Riccardo Spagni (@fluffypony)ZCash is a VC / hedge fund backed centralised (bankster) coin that literally cripples itself to become compliant. It’s not a revenge against any of that, it’s a full on embrace of all of that.Does ZCash embrace the cypherpunk manifesto by Eric Hughes? Consider some key quotes, but I encourage you to read it all:“Since we desire privacy, we must ensure that each party to atransaction have knowledge only of that which is directly necessaryfor that transaction. Since any informa ...
X @mert | helius.dev
mert | helius.dev· 2025-10-20 20:43
Privacy Properties - Zcash possesses the strongest possible privacy properties mathematically and technically due to its use of ZK (Zero-Knowledge cryptography) [1] - A growing shielded pool with an increasing number of transactions inherently provides a higher level of privacy than probabilistically traceable decoy systems [1] - Allowing transparent transactions creates an entry point for regular users to shield their transactions, further expanding the anonymity set [1] User Experience - The potential for user error is higher for new users when using optional privacy features unless a wallet like Zashi is utilized [1] - Zashi wallet has addressed the UX problem associated with optional privacy, leading to a vertical increase in the shielded pool [1] Technical Comparison - Zcash encrypts data, rendering it invisible to trackers, unlike decoy systems that use ring signatures to "confuse" trackers [1]