to catch on and become cost
competitive. I think the key is making it invisible to the user.
From: Adam Weiss
Reply: Adam Weiss >
Date: February 3, 2015 at 12:25:20 PM
To: Will >
Cc: bitcoin-development@lists.sourceforge.net
>
Subject: Re: [Bitcoin-development] Subject: Re: Proposal t
An idea for the bitcoin malware proposal below, the idea is at the bottom…
Using a desktop website and mobile device for 2/3 multisig in lieu of a
hardware device (trezor) and desktop website (mytrezor) works, but the key is
that the device used to input the two signatures cannot be in the same
Gotcha. That's much more manageable. Thanks!
Will Bickford
"In Google We Trust"
On Wed, Dec 24, 2014 at 1:44 PM, Gregory Maxwell wrote:
> On Wed, Dec 24, 2014 at 5:08 PM, Will Bickford wrote:
> > A tally from August indicated that I may need to slog through 280,000
>
could get a fair amount of testing done, so I'm
curious if we have a map of the most important areas to study for new
developers and automated test writers.
Thanks for your time,
Will Bickford
"In Google We Trust"
---
Thanks Jeff. I'll start looking there.
Will Bickford
"In Google We Trust"
On Sat, Dec 20, 2014 at 3:26 PM, Jeff Garzik wrote:
> Getting back to the original topic...
>
> I would recommend first taking a look at how the current tests are built
> (via autoconf/automa
eddit AMA a while ago.
I'm curious where I can make the best impact. Any feedback would be
appreciated. Thanks!
Will Bickford
"In Google We Trust"
--
Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT
Omaha - which is the automatic update framework that Google Chrome uses -
is open sourced:
https://code.google.com/p/omaha/
It might be a bit heavyweight for just one package though.
Will
On 9 July 2013 13:04, Mike Hearn wrote:
> For the auto update, is there an existing auto upd
source
and easily peer reviewed.
Will
On 1 April 2013 23:52, Melvin Carvalho wrote:
>
>
>
> On 1 April 2013 20:28, Petr Praus wrote:
>
>> An attacker would have to find a collision between two specific pieces of
>> code - his malicious code and a useful innoculous c
well
engineered, and satisfies many of the features in particular a very low
cost of entry, cross platform support and what appears to be very good
security (e.g. two factor)
Will
On 4 December 2012 17:46, Mike Hearn wrote:
> At the moment if you visit bitcoin.org then you're recommended
Are there any PGP key servers that support EC key pairs? OpenPGP Spec
RFC2440 defines key types for EC, just not sure if they were ever
implemented on the keyserver side. Could even have a similar 'web of
trust' using private keys to sign people's identities similar to PGP.
Will
use
the correct key. This means that if we later decide to add new keys to the
alert root trust then older clients will still relay these.
my .02btc
Will
--
Doing More with Less: The Next Generation Virtual Desktop
Wh
11 matches
Mail list logo