The surprise You may read more about Brave in my first article about the Brave browser.
After recently visiting one of my own blog post to check the spelling, I got the surprise to be welcomed by a pop proposing me to install a mysterious Crypto Wallet extension.
If you are in crypto for a while, all alarms bells should be ringing already. This typically looks like a phishing attempt.
Google Chrome needs no introduction and most people who visited an internet page within the last 5 years likely used Chrome or one of the Chromium based browsers.
There is no question that Rust is one of the, if not THE, best language of the decade.
Rust allows us writting safe code while doing most of the safety checks at compile time. That means that we no longer need to bloat the binary that is produced with extra checks to safeguard against developer mistakes such as null and dangling pointers or overflows to mention just a few.
At the launch of the Kusama network, there was no way to identify who the owner of a given account was beside making your own research and adding a name to an account in the PolkadotJS UI. New solutions have been tested and the system is evolving.
Background Address book Building your network of trust with the Address book looks like this:
This would look as follow:
ssh is the defacto standard to access a remote server. It does not offer much of a point and click GUI but get things done with a fair level of security.
ssh shows however a major drawback: it is based on TCP.
You will likely never notice any issue until you connect to a server over ssh from a train, a plane or from a mobile device, and briefly lose your connection, or if your device switches network such as going from the Wifi to your Cellphone connection and switching back to Wifi.
Unlike all other Blockchains, Polkadot (based on Substrate) allows on-chain protocol upgrades without requiring the node operators to do anything but to keep their node up and running.
If you know everything about Substrate Runtime, you may jump to the Installation section.
In order to achieve this, Polkadot stores its runtime executable as a WASM blob in its own storage. If the WASM blob is replaced, the new runtime kicks in and all the nodes start using it, altogether.
A glance at the past Back in 2018, I introduced theCyber with this first article. A second article provided more detailled information about the contracts and what needs to be solved in order to enter the small circle of people who made their way in.
After the introduction of the GateKeeperTwo detailled in this article, the readers were left with the challenge to try hacking the contract and save one of the 127 spots available.
Your account as an id, custodial wallets and dApp browsers. How to leap forward decentralized services.
The (no longer so) “inter” net of 2019 In 2019, the typical workflow for a traveler through the internet looks most of the time as:
open your favourite web browser
browse to your favourite site directly or through a search
select your auth provider, which mostly mean clicking on on of the button below.
If you ever used decentralized platforms such as Bitcoin or Ethereum (to name only a few), you probably installed a few Apps on your Desktop, on your Mobile, etc… Those includes so called wallets, dApps, etc…
The on-boarding process varies a little bit but mostly boils down to making a new account or set of accounts on the device . This new account is in fact a key pair (private key + public key) or a seed allowing the deterministic generation of multiple key pairs.