We have two chains (lol two chainz: https://www.youtube.com/watch?v=4dfSrP1CbeQ) The ETH chain and the cheapETH chain. We can assume the ETH chain has ~1000x more value than the cheapETH chain. In order to move value between chains, we need a trusted way to get the state of each chain on to the other chain. L1 -> L2 Bridge: L1 (ETH) is secured by proof of work. Generating a fake proof of work chain is very expensive. How it works: 1. Deploy contract on L2 with a checkpoint hash of an ETH block. You can manually audit this, the same way you would audit the contract address. 2. Anyone can submit future block headers of the main chain, the contract validates that they are correct and have the right difficultly. 3. If someone submits a longer chain, the contract follows that chain. (block reorg) Think like we are running a "light node" on cheapETH itself. I don't know how doable this is, but it would be nice if it worked. The key part is that the cheapETH contract must be able to validate the difficult operation. If this can't be reasonably written on the Ethereum platform, we could have a special contract address on cheapETH which contains the mainETH state hash, but I hope it doesn't come to that.
Bridge between L1 (Ethereum) and L2 (cheapETH)
Overview
A simple, terminal password manager in Python.
A simple, terminal password manager in Python.
Modern(-ish) password hashing for your software and your servers
bcrypt Good password hashing for your software and your servers Installation To install bcrypt, simply: $ pip install bcrypt Note that bcrypt should b
💰 An Alfred Workflow that provides current price of cryptocurrency
Coin Ticker for Alfred Workflow An Alfred Workflow that provides current price and status about cryptocurrency from cryptocompare.com. Supports Alfred
Version three of the Accounting Project. You can now connect multiple computers together who are on the same IP (I'm sure I could set it up so it would work on different IP's) and add to a distributed ledger verified by blockchain.
Accounting_Cycle_V3 As I talked about in the second iteration of the accoutning project, I was going to add networking capabilities to the project. Re
Enchpyter, is able to encrypt and decrypt words as you determine, of course, according to the alphabet.
Enchpyter Enchpyter is a program do encrypt and decrypt any word you want (just letters). You enter how many letters jumps and write the word, so, the
Technical_indicators_cryptos - Using technical indicators to find optimal trading strategies to deploy onto trading bot.
technical_indicators_cryptos Using technical indicators to find optimal trading strategies to deploy onto trading bot. In the Jup Notebook you wil
Python program that handles the creation, encryption and storage of log/journal files. Kinda works like a diary of sorts.
LucaSoft J.O.U.R.N.A.L The J.O.U.R.N.A.L (Just anOther User Redaction & Navigation Assistant by Lucaspec72) is a Python program that handles the creat
😈 Shining is a tool that enables engineers to remotely pull smart contract code in multi-file situations.
👑 Shining 😈 Shining is a tool that enables engineers to remotely pull smart contract code in multi-file situations. Shining is the name of one of my
基于python的一款 加解密工具
基于python的一款 加解密工具 加密: SHA序列: sha1 , sha2 , sha224 , sha256 , sha384 , sha512 , sha512-256 , sha3-224 , sha3-256 , sha3-384 , sha3-512 MD序列: md4 , md5
The (Python-based) mining software required for the Nintendo Switch mining project.
ntgbtminer - Nintendo Switch edition This is a version of ntgbtminer that works with the Nintendo Switch bitcoin miner. ntgbtminer ntgbtminer is a no
Microllect - Fully automated btc wallet hack,using advanced protocols
Microllect - Fully automated btc wallet hack,using advanced protocols
SHIBgreen is a cryptocurrency forked from Chia and uses the Proof of Space and Time consensus algorithm
SHIBgreen is a cryptocurrency forked from Chia and uses the Proof of Space and Time consensus algorithm
Coins farmer for dank memer
Created by TheRider#5308 [feel free to drop by to talk]. Note to some Dank Memer staff reading this: Nah I don't self bot, already got banned for that
A curated list of resources dedicated to reinforcement learning applied to cyber security.
Awesome Reinforcement Learning for Cyber Security A curated list of resources dedicated to reinforcement learning applied to cyber security. Note that
Hide secret texts inside an image, optionally encrypt them with a password using AES-256.
Hide secret texts/messages inside an image. You can optionally encrypt your texts with a password using AES-256 before encoding into the image.
Secure open-source password manager.
aes256_passwd_store This script securely encrypts or decrypts passwords on disk within a custom database file. It also features functionality to retri
Python Cryptocurrency with stealth addresses
Python Cryptocurrency with stealth addresses. Goal is to have create a cryptocurency that hides transactions totally. I.E. Cant see ammount sent, to who, or from who.
Tracking (of choice) cryptocurrencies' daily prices and moving average.
Crypto-price-moving_average Tracking (of choice) cryptocurrencies' daily prices and moving average. About Alpha Vantage The Alpha Vantage library (htt
Um sistema de Criptografia RSA feito totalmente em Python
Um sistema de Criptografia RSA feito totalmente em Python
Accept Bitcoin donations on Twitch, and integrate them into your alerts!
The system in action Check out how seamlessly the project works! Support the project You can tip me with some sats here!