Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly after they and their Bell Labs colleagues invented Unix. - The Strange Birth and Long Life of Unix, https://spectrum.ieee.org/tech-history/cyberspace/the-strange-birth-and-long-life-of-unix
"We have proposed a system for electronic transaction without relying on trust."
Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008
"To what extent should one trust a statement that a program is free of Trojan horses? Perhaps It is more Important to trust the people who wrote the software." - Ken Thompson, Turing Award Lecture, 1984
https://dl.acm.org/doi/10.1145/358198.358210
ver:bits:date:resource:ext:rand:counter
X-Hashcash: 1:20:1303030600:adam@cypherspace.org::McMybZIhxKXu57jd:ckvi
By Ladislav Mecir - Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=83020772
https://www.coindesk.com/price/bitcoin
https://www.coinlore.com/all_coins
Makrakis, Georgios Michail. (2018). Evaluating the performance of Distributed Ledger - Blockchain technologies in IoT environment. 10.13140/RG.2.2.23024.10248.
Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008
Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008
Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008
By Azaghal - Own work, CC0, https://commons.wikimedia.org/w/index.php?curid=18157888
By Matthäus Wander - Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=26816937
block_version = "01000000"
hash_prev_block = "81cd02ab7e569e8bcd9317e2fe99f2de44d49ab2b8851ba4a308000000000000"
hash_merkle_root = "e320b6c2fffc8d750423db8b1eb942ae710e951ed797f7affc8892b0f1fc122b"
time = "c7f5d74d"
target = "f2b9441a" # in bits format
nonce = get_next_nonce()
while calc_block_hash(block_version \
+ hash_prev_block \
+ hash_merkle_root \
+ time \
+ target \
+ nonce) < target:
nonce = get_next_nonce()
https://medium.com/coinmonks/public-vs-private-blockchain-in-a-nutshell-c9fe284fa39f
"[...] We should interrogate the architecture of cyberspace as we interrogate the code of Congress.
Unless we do, or unless we learn how, the relevance of our constitutional tradition will fade. The importance of our commitment to fundamental values, through a self-consciously enacted constitution, will fade. We will miss the threat that this age presents to the liberties and values that we have inherited. The law of cyberspace will be how cyberspace codes it, but we will have lost our role in setting that law." - Lawrence Lessig, https://harvardmagazine.com/2000/01/code-is-law-html
Joi Ito [CC BY (https://creativecommons.org/licenses/by/2.0)]
https://www.manning.com/books/building-ethereum-dapps
https://hackernoon.com/getting-deep-into-evm-how-ethereum-works-backstage-ac7efa1f0015
https://hackernoon.com/getting-deep-into-evm-how-ethereum-works-backstage-ac7efa1f0015
https://www.manning.com/books/building-ethereum-dapps
https://www.manning.com/books/building-ethereum-dapps
https://www.cryptokitties.co/
Linux Fonudation
https://www.hyperledger.org/
https://entethalliance.org/
https://alvarium.org/
"Project Alvarium will be aimed at building Data Confidence Fabrics that deliver data from devices to applications with measurable confidence."
https://sovrin.org/wp-content/uploads/2018/03/Sovrin-Protocol-and-Token-White-Paper.pdf