Posts by Tag

Smart Contracts

The Agoric Papers

40 minute read

This paper examines markets as a model for computation and proposes a framework–agoric systems–for applying the power of market mechanisms to the software do...

Object Capabilities (ObCap)

1 minute read

The capability paradigm is about access control, first proposed by Jack Dennis and Earl C. Van Horn in the 1966 paper. When a system (OS or a website) is pre...

Mark Sam Miller

14 minute read

Mark S. Miller is an American computer scientist. He is known for his work as one of the participants in the 1979 hypertext project known as Project Xanadu; ...

E Language an Object Capability Language

1 minute read

Modern smart contract systems should learn a lesson or five from it, most importantly, (object) capability security. […] it lets programs handle permissions ...

Back to top ↑

Mark Miller

The Agoric Papers

40 minute read

This paper examines markets as a model for computation and proposes a framework–agoric systems–for applying the power of market mechanisms to the software do...

Object Capabilities (ObCap)

1 minute read

The capability paradigm is about access control, first proposed by Jack Dennis and Earl C. Van Horn in the 1966 paper. When a system (OS or a website) is pre...

Mark Sam Miller

14 minute read

Mark S. Miller is an American computer scientist. He is known for his work as one of the participants in the 1979 hypertext project known as Project Xanadu; ...

E Language an Object Capability Language

1 minute read

Modern smart contract systems should learn a lesson or five from it, most importantly, (object) capability security. […] it lets programs handle permissions ...

Back to top ↑

ObCap

The Agoric Papers

40 minute read

This paper examines markets as a model for computation and proposes a framework–agoric systems–for applying the power of market mechanisms to the software do...

Object Capabilities (ObCap)

1 minute read

The capability paradigm is about access control, first proposed by Jack Dennis and Earl C. Van Horn in the 1966 paper. When a system (OS or a website) is pre...

Mark Sam Miller

14 minute read

Mark S. Miller is an American computer scientist. He is known for his work as one of the participants in the 1979 hypertext project known as Project Xanadu; ...

E Language an Object Capability Language

1 minute read

Modern smart contract systems should learn a lesson or five from it, most importantly, (object) capability security. […] it lets programs handle permissions ...

Back to top ↑

Pre-History

Before Bitcoin

6 minute read

Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to kno...

Electronic Cash, Before Bitcoin

4 minute read

Each RPOW or POW token can only be used once but since it gives birth to a new one, it is as though the same token can be handed from person to person.

Cypherpunks and the Crypto Wars

8 minute read

Phil Zimmermann was a key player in this period. The PGP software he authored was considered as munitions by the US government and subject to export licenses...

Back to top ↑

Bitcoin

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Bitcoin History

8 minute read

“The first recorded claim of bitcoin’s demise was in 2010, on a little-known blog that found itself posted on a record of ‘bitcoin obituaries’ collected by 9...

Back to top ↑

Cypherpunks

JW Weatherman Inverviews Cypherpunk Legend

73 minute read

“As a quick introduction: by the mid 80s Tim was already famous for solving something called the alpha particle problem when he was working at Intel and then...

Cypherpunks and the Crypto Wars

8 minute read

Phil Zimmermann was a key player in this period. The PGP software he authored was considered as munitions by the US government and subject to export licenses...

Back to top ↑

Permissioned

Back to top ↑

DLT

Back to top ↑

Ethereum

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Back to top ↑

Literature

The Agoric Papers

40 minute read

This paper examines markets as a model for computation and proposes a framework–agoric systems–for applying the power of market mechanisms to the software do...

E Language an Object Capability Language

1 minute read

Modern smart contract systems should learn a lesson or five from it, most importantly, (object) capability security. […] it lets programs handle permissions ...

Down the @TheCryptoconomy Rabbithole

13 minute read

Guy Swan has recorded thousands of hours, reading essential Bitcoin literature. Here’s a linked list of episodes organized by category.

Back to top ↑

Indy

Back to top ↑

HGF2018

Back to top ↑

Permissionless

Back to top ↑

John Wolpert

Back to top ↑

Practical

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Back to top ↑

Resources

Bitcoin Info

35 minute read

Bitcoin is a revolutionary system that is quite complex and has a steep learning curve. Below you’ll find curated educational resources and information about...

The Libra Blockchain

8 minute read

Everything related to Facebook’s LibraCoin - A simple global currency and financial infrastructure that empowers billions of people.

Back to top ↑

Eric Drexler

The Agoric Papers

40 minute read

This paper examines markets as a model for computation and proposes a framework–agoric systems–for applying the power of market mechanisms to the software do...

E Language an Object Capability Language

1 minute read

Modern smart contract systems should learn a lesson or five from it, most importantly, (object) capability security. […] it lets programs handle permissions ...

Back to top ↑

Introduction

SourceCrypto Research-Index

2 minute read

Source Crypto Discord Chat is a landing pad.. I drop links there on the fly, occasionaly exporting and publishing the channels here. The next step is to syst...

Back to top ↑

Cryptocurrency

History of Cryptocurrencies

less than 1 minute read

This is probably the least developed resource on the website. I’m still busy picking up on all the pre-history.

Back to top ↑

Virtual Currency

Electronic Cash, Before Bitcoin

4 minute read

Each RPOW or POW token can only be used once but since it gives birth to a new one, it is as though the same token can be handed from person to person.

Back to top ↑

Identity

Back to top ↑

VON

Back to top ↑

DID

Back to top ↑

Data

Back to top ↑

Permissioned Ledgers

History of Permissioned Ledgers

4 minute read

bureaucracies are so heavily invested in the expertise and importance of local regulations and standards that it’s extremely difficult for them to cut the Go...

Back to top ↑

State Channels

Back to top ↑

Edge Chains

Back to top ↑

Design Theory

Back to top ↑

Tim May

JW Weatherman Inverviews Cypherpunk Legend

73 minute read

“As a quick introduction: by the mid 80s Tim was already famous for solving something called the alpha particle problem when he was working at Intel and then...

Back to top ↑

United Nations

Blockchain and the United Nations

17 minute read

2010, the UN Commission on Science and Technology for Development [CSTD] proposed the introduction of a technology-driven universal currency. A BitMint would...

Back to top ↑

Stephan Livera

Back to top ↑

Andreas Antonopolous

Back to top ↑

Bitcoin Maximalism

Back to top ↑

PGP

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Back to top ↑

Escrow

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Back to top ↑

Key Signatures

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Back to top ↑

DeepDotWeb

Using PGP and Cryptocurrency Keysignatures

5 minute read

“It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret roman...

Back to top ↑

R3

Back to top ↑

IBM

Back to top ↑

Richard Gendal Brown

Back to top ↑

Christopher Allen

Smart Signatures - Christopher Allen

26 minute read

I want to talk about smart signatures, there have been a number of experiments in this area, the most successful is Bitcoin. The first attempt to come up wit...

Back to top ↑

Smart Signatures

Smart Signatures - Christopher Allen

26 minute read

I want to talk about smart signatures, there have been a number of experiments in this area, the most successful is Bitcoin. The first attempt to come up wit...

Back to top ↑

Rare Digital Art

Back to top ↑

Counterparty

Back to top ↑

Rare Pepe

Back to top ↑

welcome

SourceCrypto Blog-Feed

1 minute read

I’m now able to appreciate the technical limitation for shaping my categorization process. It makes sense to have 10 or less ways to divide the entire ecosys...

Back to top ↑

Consortium

The Libra Association

2 minute read

Everything related to LibraCoin’s Consortium, ‘The Libra Association’.

Back to top ↑

Podcast

Down the @TheCryptoconomy Rabbithole

13 minute read

Guy Swan has recorded thousands of hours, reading essential Bitcoin literature. Here’s a linked list of episodes organized by category.

Back to top ↑

Layer 2

Back to top ↑

Lightning

Back to top ↑

Chaum

Back to top ↑

recap

Back to top ↑