This is a mini post to show how MaidSafe uses hashes to identify data after processing it in a way that’s invisible to end users. I hope it is at least a little bit useful. (note the use of encryption…
This is a mini post to show how MaidSafe uses hashes to identify data after processing it in a way that’s invisible to end users. I hope it is at least a little bit useful. (note the use of encryption…
Sorry folks, another too fast an furious post, forgive mistakes and I will again update with any comments and improvements. Proof of Storage != Proof Of Resource Proof of storage is an important part of proof of resource, but only…
This post is probably very brief and disingenuous for any mathematician out there, it is aimed at as many people as possible and I hope it comes across in an easy to understand way. We will see I suppose 🙂…
This is more of a quick note than a full post. I hope it helps others who are trying to change this pale blue dot for the better! [watch this, it explains a lot and is very enlightening] Recently as MaidSafe…
Introduction From the outside, some people see, that lot just got $7Million for nothing. From the inside of the bubble life is very different. Lets go back a bit though. MaidSafe is an enormous proposition, replace all Internet services, redo…
I have often been asked by people near me saying “how did you come up with all these parts and glue them together in your head” I then usually answer, “you need to think the maidsafe way”. First though we…
Secure Access For Everyone coin Is a coin that is generated and protected by the SAFE network and stays on the SAFE network (It of course can be copied as it is data, but off-network copies are of no value…
This post is a little more technical than many others. I apologise in advance, however the system described could prove very significant for us all. Some people will know I am on the maidsafe developers mailing list a lot. There I try…
Ethics and exploitation In the security world there is a seemingly unique requirement according to Cory Doctrow in this video (which is a great watch BTW). I agree the security industry requires full disclosure of algorithms and methods to run effectively,…
Capitalism. Communism, Fascism, Socialism, Republican, Democrat, Conservative, Liberal, Labour and all the rest of the prescribed rule-sets for humanity fail. Over and over again they fail and all we do is ping-pong between them. Some weeks the yellow shirts win…