Three architectural families have broken an assumption that was treated as a law of cloud architecture for two decades: that the machine running a computation must see the data the computation runs on. Homomorphic encryption operates on ciphertexts, secure multi-party computation distributes the work across non-colluding participants, and trusted execution environments isolate the work inside a hardware enclave opaque to the machine's owner. The privacy architecture of the next decade will be built on their compositions.
View article →
Max
max@towardsliberty.com
npub1klkk...x3vt
Praxeologist ~ Cryptoanarchist ~ Cypherpunk
Working on making marmot transport layer agnostic.
400 optech editions, crazy!
Thanks a lot to all contributors!
View quoted note →
Reminder, Marmot community call in 30 minutes.
View quoted note →
There is now an official internet standard that makes it possible for Tor onion services to get verified security certificates the same way any website does, automatically, for free. 

IETF Datatracker
RFC 9799: Automated Certificate Management Environment (ACME) Extensions for ".onion" Special-Use Domain Names
This document defines extensions to the Automated Certificate Management Environment (ACME) to allow for the automatic issuance of certificates to ...
Bitcoin settles payments without counterparty permission, and Nostr coordinates action without censorship. Together they enable spot transactions and real-time coordination across the parallel economy. What they cannot do is create credit, and without credit, the parallel economy cannot finance production across time.
View article →
Next marmot client joins the burrow!
Test out nymchat.app
View quoted note →
Don't do this with your own app, sign it yourself instead!
View quoted note →
Zapstore
Publishing apps — Zapstore Documentation
Zapstore documentation