27 Matching Annotations
  1. Oct 2019
    1. For each call to your API, user should send token with every API request and you should validate the encoded toke and either deny or send back the response.
  2. Jun 2019
  3. Mar 2019
    1. “token curated registry”—basically a listicle, with equity.

      This is probably the clearest and most pithy description of a "token curated registry" I have read. And I tried very hard to explain the concept in articles like this one, about Civil.

      🔗 Here's the canonical thing on TCRs, by Mike Goldin.

  4. Jan 2019
    1. I don’t get the LINE token, the Kakao token, the Telegram token and now the Facebook token. All these messaging apps DO NOT need crypto token for digital payment or in app purchase an elegant digital payment design plus LOTS of effort on merchants on-boarding can work well

      <big>评:</big><br/><br/>现行的数字支付体系和推广模式固然能满足 IM 软件生态内的支付与流转需求,但这些互联网厂商的野心并不止步于此,圈地画饼背后的贪婪足以压倒所有关于无用功的论述。若把屏幕前的用户比作浩瀚宇宙中的孤独星球,现在的即时通讯平台就是强大的引力场,被吸引过来的星体在此不断碰撞、合并。有朝一日,这些引力场都跳出来说自己要成为新的宇宙。可是这对于星体们来说,又与其何干呢?<br/><br/>在庞大的生态体系里,力量不断堆聚,演化出新的「极」。没有人是孤岛,但你就在孤岛。

    1. 在整个过程中,中心化交易所不但是现实世界与区块链世界的出入口,还是不同区块链网络的连接器。简单来说,交易所决定了一个新的 Token 是否有资格接入其他 Token 以及法币共同构成的清算网络。很多区块链项目的发展在被扭曲为满足交易所需求的方向上越走越远。区块链经济网络急需分布式的清算机制加入,其意义不在于要迅速替代中心化的交易所,而是带来一种新的选择与制衡,让区块链的真正价值被再次发掘,让用分布式的方式解决分布式的问题成为可能。

      <big>评:</big><br/><br/>至今为止我们还没有遇到完美的币种,可能以后也不会有。哪怕是久居排行榜单之首的比特币,也难以自视清高,不加入这首群雄逐鹿的协奏曲,但是契合乐谱精神的指挥家想必不是中心化的交易所。倘若让这曲华章无限延伸,我们或终将寻到一位让乐迷们心悦诚服的意中人。</br></br>然而,总有些东西是永恒的。不妨就让他们在此演奏,直到永远。

  5. Oct 2018
    1. Token binding makes session hijacking harder by creating an identifier that is based on a private key. The client generates a public/private key pair for every site that it wants to use token binding on. When it connects to the server it signs something and sends this signature along with the public key to the server. The server verifies the signature against the public key. This way, the server knows that this client is in possession of the private key. After this verification step, the public key is passed to the application. This public key uniquely identifies the client, just as a session cookie would. However, it is no longer possible to simply steal the identifier and impersonate someone. The private key is kept secret and the identifier is checked against it. Without access to the private key it is not possible to reproduce a valid identifier. Even if an attacker intercepts the signature, he can’t use this in another connection. The signature is over the public key and the keying material of the current TLS connection. When a new TLS connection is created, a new signature is needed. This means that if the attacker intercepts the signature, he can’t reuse it in a new connection to the server.
    1. This NGINX module provides mechanism to cryptographically bind HTTP cookies to client's HTTPS channel using Token Binding, as defined by following IETF drafts:
    1. This document specifies version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the Token Binding identifiers are only conveyed over TLS and can be reset by the user at any time.
  6. Jul 2018
    1. ...

      This punctuation mark appeared quite a lot in the maid's narrative. The loss of her Lady was unbearable to her. Her whole world used to revolve around her Lady. And a frequency comparison of '...' in this and other short stories of Katherine would probably show the maid's awkwardness in her monologue.

    2. Out came the thin, butter-yellow watch again, and for the twentieth—fiftieth—hundredth time he made the calculation.

      The watch is a recurring motif in this story. And time after time the 'thin', 'butter-yellow' aspects of the watch were underscored. And here Katherine demonstrated a peculiar use of the token '----' , maybe she used it in consistence with her other stories such as The Garden Party.

  7. Jun 2018
    1. Basically, all token pitches include a line that goes something like this: "There is a fixed supply of tokens. As demand for the token increases, so must the price." This logic fails to take into account the velocity problem
    1. The first practical problem with velocity is that it’s frequently employed as a catch-all to make the two sides of the equation of exchange balance. It often simply captures the error in our estimation of the other variables in the model.
    2. The core thesis of current valuation frameworks is that utility value can be derived by (a) forecasting demand for the underlying resource that a network provisions (the network’s ‘GDP’) and (b) dividing this figure by the monetary base available for its fulfillment to obtain per-unit utility value. Present values can be derived from future expected utility values using conventional discounting. The theoretical framework that nearly all these valuation models employ is the equation of exchange, MV=PQ.
    1. Crypto provides a new mechanism for organizing human activity on a global basis usingprogrammable financial incentives. It’s an opportunity to design information networks which canachieve unprecedented levels of scale by decentralizing the infrastructure, open sourcing thedata, and distributing value more broadly. What we’ve discovered is the native business model ofnetworks – which, as it turns out, encompass the entire economy.
    2. Most of the use cases today involve compensating machine work (transaction processing, filestorage, etc.) with tokens: the building blocks of decentralized applications. But the greatestlong-term opportunity is in networks where tokens are earned by end-users themselves.
    3. We’ve also realized how inefficient the joint-stock equity industry model is at accounting for anddistributing the real value created by online networks. The value of a share of stock is necessarilya function of profits; the price of Twitter’s stock only reflects Twitter Inc’s ability to monetizethe data – and not the actual worth of the service. Tokens solve this inefficiency by derivingfinancial value directly from user demand as opposed to “taxing” by extracting profits.
  8. Feb 2018