From book: Plutus: Writing reliable smart contracts by
, and Alejandro Garcia Fdz.
We are very excited to explore ways of representing all ACTUS contracts as smart contract implementations on Plutus!
An excellent post on FASAB 56
Beautiful work #Cardano
Good post @purism
The darker side of “control vs. freedom” or “control + harm” casts a shadow on every facet of technology—and it is a digital civil rights issue, where control over you by corporations is causing you harm, all the time, on all your devices.
"Nothing I found quite hit that sweet spot. ...but then a colleague suggested I look into Purism. I fell in love and bought a Librem 13. It's been so great."
#Cardano stake pool test-net is launching, and IOHK wants its users to submit data through a Goole doc, sad, very sad.
Sadly, some of Cardano's most steadfast supporters want to help but submitting, truthful, data through Google is not an option for those of us who believe and take action to mitigate our and our client's exposed to companies that exploit first.
There are times #Cardano this is one of those times.
Soshen.io is operating on Amazon & is not open source 😞
"Soshen API which allows for developers and stake pool operators to easily run a blockchain full node by providing a full node service, which Soshen will manage, in order to enable developers to build on Cardano and stake pool operators to run stake pools without the hassle of setting up a data-intensive full node. "
@rantipole They don't. I added it because if Sybil, a0, is designed to prevent a person or persons form controlling the system, then only pools with a lot of pledge will get saturated.
@rantipole I would say millions, pledging 10% or more.
The calculator has Pledge to Delegation Ratio to get you thinking along those lines.
@rantipole Yes. Pledging 100% removes Sybil, at least that is how it looks to me.
I just updated the calculator to better reflect what is going on, Sybil Pool View highlights this.
How can I help you?
Security Advisory: Kernel and Firmware Updates for Intel MDS Vulnerability