Ed
E. de Smidt
3 records found
1
Authored
Periscope
Censorship-Resistant Off-Chain Traffic Tunnelling
There is an everlasting arms race between censoring bodies and those in its grip. When the censor is employing increasingly sophisticated techniques to digitally monitor and restrict those in its scope, equally sophisticated means to circumvent the digital repression come forward
...
Stop Boiling the Oceans
A Review on Energy Efficient Proof of Work Alternatives
Bitcoin’s underlying consensus algorithm, Proof of Work, is of inefficient nature. Due to the sheer size that Bitcoin has grown to over the recent years, power consumption has increased so much that the Bitcoin network has been estimated to consume more power than the whole count
...
Customer Verification Engine
Automated Customer Verification for a Peer-to-Peer Lending Platform
There is a lot involved in providing a loan as a company, mostly in terms of legalities and risk management. As a lender it is important to have a clear record of the customers applying for a loan, as this helps assessing the risk that comes with providing a loan. Furthermore, it
...