Howdy readers! Welcome to the last issue for 2015! See you next year!
|
|
December 28 · Issue #9 · View online
The most interesting things I've seen in blockchain, tech, and our decentralizing world as seen from the world's border with China.
|
|
Howdy readers! Welcome to the last issue for 2015! See you next year!
|
|
|
Coinbase running Bitcoin XT nodes
Coinbase CEO announces that they are running Bitcoin XT nodes in production as promised several months ago. The name hurling and insults began almost immediately.
The behavior of both the big blocker and small blocker camps of this debate is unfortunate, as both sides have good arguments, despite what the more hardcore members of each tribe will tell you.
The Greg Maxwell roadmap offers some positive improvements to Bitcoin’s capacity and is trying to be sold by proponents as having widespread consensus while others point out that many of those who have signed the statement of support, are employed by a couple companies. In doing this, some vocal members of both sides use words that end up generating outrage and hurt feelings instead of productive communication and understanding.
|
Agner`s CPU blog - Moores law hits the roof
Interesting read about how CPU technology is running up again limits of physics: the speed of light and size of atoms. This is a reminder that trend of growing computing power, bandwidth and storage capacity are things that are constrained by real world limits of laws of physics. This is one reason people are concerned about picking a bitcoin block size growth rate that grows at rate that is faster than the laws of physics may allow.
|
|
Inside North Korea's Totalitarian Operating System
North Korea’s Redstar operating system tracks its users and every file they look at. Fascinating story.
|
The Four Kinds of Privacy
When we say something protects privacy, or someone has the right to privacy, what do we mean? Read this to learn about the different kinds of privacy. I’ve found this useful in thinking about why people say they don’t care about X invasion of their privacy.
|
How does the Cybersecurity Act of 2015 change the Internet surveillance laws?
Last week, Congress enacted the Cybersecurity Act of 2015, a law tucked inside the Omnibus Appropriations Act. Here’s a first effort to describe in detail how the new law changes the Internet surveillance statutes.
|
How to Talk to Your Parents About Encryption
Want to talk about encryption at your New Year’s Eve parties? Here’s your guide!
|
Did you enjoy this issue?
|
|
|
|
If you don't want these updates anymore, please unsubscribe here
If you were forwarded this newsletter and you like it, you can subscribe here
|
|
|
|