An example of a metaverse would be Estonian government- a government built on cryptographic hash functions. It enables Estonians to access nearly all of the government statutory services online.

What metaverse aims to be is to make sense of data. Estonia started their development for the X-Road (A cryptographic has functions for government related functions) back in 2001, and it was slowly released, and developed until now.

This is an overview on what it looks like-

X-Road: Estonia

The idea is simple- 1 Certification center to confirm your ID, and that ID would then be used through some form of decentralization of services for statutory agencies that talks to each other. The issue they tried to eradicate is intra-agency coordination. Allegedly, the system saves a user approximately ~15 minutes per query, and saving Estonian government 820 years worth of work every year.

Now, this could mean that the services were slow, or very slow in the first place- and it is possible that it is accumulating the saved minutes per query.

In terms of services, maybe this Figure would look somewhat familiar- especially on the 'contract' bits.

https://preview.redd.it/v029b7ida7881.png?width=1000&format=png&auto=webp&s=d3dd5b386a698128d1b45eba54e8650fab837fda

https://preview.redd.it/f00ivhyea7881.png?width=8001&format=png&auto=webp&s=955e9f6b69f58be7c06d753bec15fbedf9096907

What this means is that- the world could go flatter, and this is the next step for 'globalization'. Now, in terms of metaverse, it would be ideal if most participating countries were to adopt similar system, therefore- all countries would be able to coordinate their information with each other.

We know there are already systems in placed for this- such as international banks, and immigrations. However, each countries in general are working in silos. Metaverse allows them to work in an integrated manner through smart contracts. This could help issues such as double taxation, and enabling the system to pin-point individuals who are susceptible to a perpetrated crime.

There are also questions on how metaverse could be different from shopping sites such as eBay or Amazon- it's an exploratory question and if I had to take a calculated guess, we'd be looking at new ways to interpret consumer data, worldwide. What I can see is that- the metaverse can make the barriers to entry for companies worldwide to be able to sell their products and services easier.

This is just my 2 Sats' worth on how I see countries would adopt the metaverse.

... keep reading on reddit ➑

πŸ‘︎ 35
πŸ’¬︎
πŸ‘€︎ u/the_far_yard
πŸ“…︎ Dec 28 2021
🚨︎ report
TIL Exporting cryptographic technology (sending secret messages) out of the US was illegal until 1992 and the technology was considered "munitions". en.wikipedia.org/wiki/Exp…
πŸ‘︎ 88
πŸ’¬︎
πŸ‘€︎ u/Cats_n_Porn
πŸ“…︎ Dec 24 2021
🚨︎ report
100% cryptographic secure python script for generating passwords. Obviously its free software v.redd.it/4gv8vzn9v4681
πŸ‘︎ 26
πŸ’¬︎
πŸ‘€︎ u/MattioC
πŸ“…︎ Dec 17 2021
🚨︎ report
spg - A secure password generator written in python. It is 100% cryptographic and does not rely on the random library v.redd.it/qlgatrspb5681
πŸ‘︎ 46
πŸ’¬︎
πŸ‘€︎ u/MattioC
πŸ“…︎ Dec 17 2021
🚨︎ report
Signing app for MacOS is like alien cryptographic language

How do I sign my ElectronJS app for MacOS?

I've read numerous articles and guides, but I still don't understand it.

If you have experience and have done it before, I'll pay you to help me.

This process boggles my mind.

πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/aidv
πŸ“…︎ Jan 11 2022
🚨︎ report
Very Fast Non-Cryptographic Hash Function (competitor to wyhash, xxhash), C github.com/avaneev/komiha…
πŸ‘︎ 174
πŸ’¬︎
πŸ‘€︎ u/avaneev
πŸ“…︎ Nov 27 2021
🚨︎ report
New year - new Research seminars season coming! Dive into zero-knowledge proofs and new cryptographic techniques for blockchain scalability with Dario Fiore from IMDEA Software Institute.

✍️ Sign up here

πŸ‘︎ 29
πŸ’¬︎
πŸ‘€︎ u/NomadicLabs
πŸ“…︎ Jan 07 2022
🚨︎ report
Decentralized and cryptographic technologies and infrastructures are more powerful then all the legacy financial system and the controllers of it.

Even if all current coins will go to 0 instantly now (Which is extremely unlikely by all means...) then it wouldn't change the fact that the mere awareness that was globally developed around the idea of decentralization and the blockchain vision will sooner or later lead to the singularity of man kind. Possibly within not too many decades.

Price being such a main and discussed topic in these proportions shows us how very little people give attention to what it's really all about...

What are you trying to achieve? Prosperity? Then be patient, the geniuses of the planet are working for us. Ever since I saw bitcoin is being used to currency alongside fiat on some internet alleys before there were any exchanges for it. As a young teen I knew there's power here that can not be possibly killed, nor practically be set stagnated since code can be forked... And the code matters...

Who's having a beer? You know, bulls and bear are a fiction, there's only one market, the beer market =)

πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/StartThings
πŸ“…︎ Jan 09 2022
🚨︎ report
TIL that breaking the cryptographic algorithm AES would take 15.5 trillion years with the world's most powerful supercomputer (200,000 trillion calculations per second) en.wikipedia.org/wiki/Adv…
πŸ‘︎ 209
πŸ’¬︎
πŸ‘€︎ u/SouthWave9
πŸ“…︎ Nov 10 2021
🚨︎ report
So what is the "cryptographic puzzle" that's being mined exactly? (informative 10 mins!) youtube.com/watch?v=IVqD-…
πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/LuKeNuKuM
πŸ“…︎ Jan 04 2022
🚨︎ report
Garage Door opener with challenge-response cryptographic security and LFP battery backup

I would use my garage door opener as a backup to a smart lock without an outside knob, except that it would be disabled by a power outage. Also, garage door remotes have notoriously bad security. There are also garage door openers that have battery backup, but they use lead-acid AGM cells which turn to trash pretty quickly.

πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/stcredzero
πŸ“…︎ Dec 24 2021
🚨︎ report
What kind of party do Cryptographic Swingers go to?

A Diffie-Hellman key exchange

πŸ‘︎ 59
πŸ’¬︎
πŸ‘€︎ u/ZacBroski
πŸ“…︎ Jan 15 2022
🚨︎ report
What cryptographic function do Eth wallets use to encrypt the private key in the keystore file with a password?

> For example, Bitcoin Core encrypts its wallet using the Advanced Encryption Standard (AES).

Is it the same for Ethereum keystore files that can be unlocked with a password?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/Junior_Cress5394
πŸ“…︎ Jan 06 2022
🚨︎ report
Write-ins on cryptographic voting

I've been reading papers about cryptographic voting and I've noticed that very few recent papers talk about write-in candidates in depth. Most that mention it only mention it and do not appear to attempt anything innovative with the concept. I do searches like "e-voting write in" and "cryptographic voting write-in" and find very few papers focusing on this, despite the fact that every major election I have participated in has had many races with a write in option.

Has work in this field stagnated or am I just not looking for it correctly?

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/Zarquan314
πŸ“…︎ Jan 12 2022
🚨︎ report
How would you go about attacking a cryptographic discrete dynamical system?

I created a simple cipher that attempts to take advantage of the chaotic and unpredictable nature of dynamical systems by converting a message into an integer and iterating over a generated algebraic(ish) function.

Predicting the behavior of dynamical systems is hard enough even when you know the function, but with the function being hidden (as the 'key') it feels like an impossible task.

How would you go about attacking such a cipher?

Code: https://xywcjbyl.me/code/

Edit: Here is the code on GitHub: https://github.com/Ordinary1729/simba/blob/main/simba.py. I made a website with an implementation of the cipher and thought a Caesar cipher of the url decipher.me was clever, but in retrospect it just looks like a sketchy link...

πŸ‘︎ 17
πŸ’¬︎
πŸ‘€︎ u/Ordinary1729
πŸ“…︎ Dec 04 2021
🚨︎ report
Change memory straps without breaking cryptographic signature

Is there a way I could modify the memory strips and with working CSM Disable? PolarisBiosEditor breaks Cryptographic signature so I can't really use W11 which needs CSM Disabled and SecureBoot Disabled. Anyone knows another way? (SRBMiner?)

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/D1stRU3T0R
πŸ“…︎ Dec 25 2021
🚨︎ report
Coinbase Announces Acquisition of Cryptographic Security Firm for Undisclosed Amount dailyhodl.com/2021/12/02/…
πŸ‘︎ 6
πŸ’¬︎
πŸ“…︎ Dec 02 2021
🚨︎ report
Coinbase Announces Acquisition of Cryptographic Security Firm for Undisclosed Amount dailyhodl.com/2021/12/02/…
πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/lily_Lydia
πŸ“…︎ Dec 02 2021
🚨︎ report
How many ciphers of any useful cryptographic security can be implemented using 52 cards? Besides variations Card-Cameloon of and Solitaire? en.wikipedia.org/wiki/Sol…
πŸ‘︎ 4
πŸ’¬︎
πŸ“…︎ Jan 06 2022
🚨︎ report
Learn Verification of Cryptographic Protocols

Hi,

In the last few years, I have been interested in cryptography. I took courses at the university on the subject, as well as MOOCs (Coursera Cyprtography I) or reading books. This allowed me to learn about cryptographic primitives and building blocks but not so much about protocols such as TLS or Signal protocol. There is sometimes a brief description with a general overview of how the protocol works and its security properties but nothing on how we can reason and proves these properties. After some research, I found this article https://galois.com/blog/2021/05/who-is-verifying-their-cryptographic-protocols/ or this one https://bblanche.gitlabpages.inria.fr/publications/BlanchetETAPS12.pdf and it seems that proving properties of protocols uses techniques similar to verification of software with software prover. I would like to know if any of you have good resources (courses, books,…) to recommend for learning about these topics. Thank you.

πŸ‘︎ 27
πŸ’¬︎
πŸ‘€︎ u/Zulres
πŸ“…︎ Oct 31 2021
🚨︎ report
Cryptographic enthusiasts want to buy the NBA team after failing to buy the U.S. Constitution pennsylvanianewstoday.com…
πŸ‘︎ 12
πŸ’¬︎
πŸ‘€︎ u/NotCoolNickname
πŸ“…︎ Nov 27 2021
🚨︎ report
On this day in 2009 the first transaction of Bitcoin currency, in block 170, takes place between Satoshi and Hal Finney, a developer and cryptographic activist. Can you guess how many Bitcoin transactions occur daily nowadays?
πŸ‘︎ 12
πŸ’¬︎
πŸ‘€︎ u/Erika_NiceHash
πŸ“…︎ Jan 12 2022
🚨︎ report
Public Report – WhatsApp opaque-ke Cryptographic Implementation Review research.nccgroup.com/202…
πŸ‘︎ 7
πŸ’¬︎
πŸ‘€︎ u/digicat
πŸ“…︎ Dec 15 2021
🚨︎ report
"So, the approach I would recommend is to decentralize the data using more complex cryptographic algorithms that allow each individual peer to maintain their own data" ... Wright slowly starts to understand the system Satoshi created a decade ago t.me/CSW_Slack/3344
πŸ‘︎ 16
πŸ’¬︎
πŸ‘€︎ u/nullc
πŸ“…︎ Nov 10 2021
🚨︎ report
Coinbase Announces Acquisition of Cryptographic Security Firm for Undisclosed Amount - The Daily Hodl dailyhodl.com/2021/12/02/…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/Lily_886
πŸ“…︎ Dec 17 2021
🚨︎ report
β˜‘οΈ FairySwap leverages bleeding-edge cryptographic algorithms, including atomic swaps and anonymous transfers, to create ZK synthetic assets to protect trader privacy. v.redd.it/xtsr7sgqrfa81
πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/sleep-over661
πŸ“…︎ Jan 08 2022
🚨︎ report
Arduino WAN, Helium network and cryptographic co-processor blog.christianperone.com/…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/perone
πŸ“…︎ Jan 13 2022
🚨︎ report
Coinbase Announces Acquisition of Cryptographic Security Firm for Undisclosed Amount dailyhodl.com/2021/12/02/…
πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/Fallstor52
πŸ“…︎ Dec 02 2021
🚨︎ report
One Bad Apple - An expert in cryptographic hashing, who has tried to work with NCMEC, weighs in on the CSAM Apple announcement hackerfactor.com/blog/ind…
πŸ‘︎ 1k
πŸ’¬︎
πŸ‘€︎ u/post_break
πŸ“…︎ Aug 08 2021
🚨︎ report
Do not claim that you have built a strong (non-cryptographic) hash function if you didn’t pass it through nine circles of peer review hell. m1el.github.io/refterm-ha…
πŸ‘︎ 93
πŸ’¬︎
πŸ‘€︎ u/prouxi
πŸ“…︎ Oct 31 2021
🚨︎ report
How many ciphers of any useful cryptographic security can be implemented using 52 cards? Besides variations Card-Cameloon of and Solitaire? en.wikipedia.org/wiki/Sol…
πŸ‘︎ 5
πŸ’¬︎
πŸ“…︎ Jan 07 2022
🚨︎ report
πŸ’₯NFTs are created when blockchains string records of cryptographic hash, a set of characters identifying a set of data, blockchains blocks the data which creates an unidentifiable dataπŸ’₯
πŸ‘︎ 140
πŸ’¬︎
πŸ‘€︎ u/ColexionNFT
πŸ“…︎ Dec 02 2021
🚨︎ report
If computers are completely deterministic, how do irreversible cryptographic hash functions work?

When you encrypt a message, it gets put through some kind of cryptographic hash function that is completely deterministic - put the same message in, you get the same hash. If every step in the process to create the hash is known, why is it so hard to simply walk backwards through the process to obtain the initial message?

πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/Gimbloy
πŸ“…︎ Nov 02 2021
🚨︎ report
Coinbase to acquire leading cryptographic security company, Unbound Security blog.coinbase.com/coinbas…
πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/CryptoAddict420
πŸ“…︎ Dec 02 2021
🚨︎ report
Ouroboros Chronos provides the first high-resilience, cryptographic time source based on blockchain technology iohk.io/en/blog/posts/202…
πŸ‘︎ 146
πŸ’¬︎
πŸ‘€︎ u/dominatingslash
πŸ“…︎ Oct 27 2021
🚨︎ report
This is why Algorand needs that Master cryptographic (back door) Key to freeze accounts if needed. Who do you trust? A youtuber or the team behind Algorand? v.redd.it/yefvjdtjkop71
πŸ‘︎ 44
πŸ’¬︎
πŸ‘€︎ u/gotti201
πŸ“…︎ Sep 25 2021
🚨︎ report
I'm looking for a Cryptographic proof of a set union

Hey everyone, I wonder if there is a cryptographic primitive that allows one to proof that they have a set of values (thousands of public keys in my case) such that another agent can verify that their set of values sufficiently overlaps. Primarily in the case were the majority of values will overlap, but not 100%.

EDIT: For my use case it would be important that the prover cannot provide a proof of a subset that is smaller than what the verifier deems acceptable. The prover would be able to provide a proof of a larger set, as long as it intersects with the verifiers set to a minimum degree.

I'm looking into cryptographic accumulators but they seem to mainly deal with 1-item membership proofs. A union of accumulators Is quickly mentioned in this paper but it is not very well explained: https://eprint.iacr.org/2018/1188.pdf

Thank you!

πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/advanderveer
πŸ“…︎ Oct 10 2021
🚨︎ report
ACX integrates the highest cryptographic safeguards and best practices while adding WebAuthn protocols. All transactions and states will be validated and stored on public-based blockchains such as BSC, enabling audits and upholding integrity. #BTC #Ethereum #FTM #DEX
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/AlchemiExchange
πŸ“…︎ Dec 31 2021
🚨︎ report
That's My Ape! An entirely blockchain-free cryptographic chain of custody tool thatsmyape.com/
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/cryptogogue
πŸ“…︎ Dec 23 2021
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.