You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NixOS automatic ungoogled-chromium setup with extensions
NixOS automatic ungoogled-chromium setup with extensions
A NixOS module/config that sets up some stuff on ungoogled-chromium, hope this can help somebody:)
Important
If you want to just include this module in this config into your system make sure to update the hash path to some persistent location on your computer: CHROMIUM_HASH_FILE="/persist/chromium-config.hash"
Challenges
The most important takeaways from this config are the following
DataKanren, a combination of datalog and microkanren
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
There might be a secure scheme that non-interactively generates a n-of-n FROST key and from there you can interactively turn it into a t-of-n by issuing new shares (i.e. enrolment).
I don't really know if this is a useful contribution even if it works. There might be some utility in not having multiple schemes but rather a one size fits all approach.
Idea
MuSig takes a "multiset" of n public keys and outputs a single aggregated key which takes n-of-n secret keys to sign.
Set z_i = H(X_1,.. X_i, .. X_n, X_i) for i = 1,2, .. n.
Tagless-final encoding of a simple arithmetic language in Rust
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Simple and quick module system alternative + thoughts and tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This document proposes a new scheme to avoid address reuse while retaining some of the convenience of address reuse,
keeping recoverability purely from Bitcoin time chain and avoiding visible fingerprint.
The scheme has negligible average overhead.
Ad-blocking DNS-over-TLS/HTTPS server w/ NixOS & Knot Resolver. Pi-hole alternative.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Configure sway as the window manager for NixOS with gdm as the display manager
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Design for a CoinSwap Implementation for Massively Improving Bitcoin Privacy and Fungibility
Design for a CoinSwap Implementation for Massively Improving Bitcoin Privacy and Fungibility
25/5/2020
Abstract
Imagine a future where a user Alice has bitcoins and wants to send them with maximal privacy, so she creates a special kind of transaction. For anyone looking at the blockchain her transaction appears completely normal with her coins seemingly going from address A to address B. But in reality her coins end up in address Z which is entirely unconnected to either A or B.
Now imagine another user, Carol, who isn't too bothered by privacy and sends her bitcoin using a regular wallet which exists today. But because Carol's transaction looks exactly the same as Alice's, anybody analyzing the blockchain must now deal with the possibility that Carol's transaction actually sent her coins to a totally unconnected address. So Carol's privacy is improved even though she didn't change her behaviour, and perhaps had never even heard of this software.