Johan Pouwelse
Johan Pouwelse
The algorithms for decentralized training are here already for data-center context (e.g. 100 x H100 == $40 million in GPU cost). This is still SGD we deployed already a decade...
thnx! Do we override Libtorrent DHT bootstrap defaults?
# Homo Autonomous: beyond Homo Economicus We describe a vision with a high ambition level, devising an economic ecosystem in which people are autonomous. A realistic roadmap is presented to...
Smart contracts are the natural layer to build on top of solid trust and identities. [However, that is extremely inefficient](http://www.multichain.com/blog/2015/11/smart-contracts-good-bad-lazy/) due to current lack of concurrency and high-throughput for the...
Key storyline: our requirement is life-critical dependability, for critical infrastructure. This is key to identity and trust layer. It should be usable for medial applictions. The 1985 theoretical foundation: 
Zero-knowledge proof of credentials and [any attribute](https://www.google.com/search?q=algebraic+mac+and+keyed+verification+anonymous+credentials) Microsoft + University College London paper [Algebraic MACs and keyed-verification anonymous credentials](https://scholar.google.com/scholar?cluster=4970010815654006573) ``` Anonymous credentials present a solution that simultaneously preserves the integrity...
# blockchain for: identity, transitive trust and transactions within logistics, healthcare, and energy sector We propose a project with a high ambition level: showing how it is possible to re-organise...
# you are the Internets _killer app brainstorm_ Every concept and new infrastructure requires viral first-time usage. We envision an Internet where everybody moves messages for others. Basically, offer free...
PUF technology is an emerging technology to store the essential part of a self-sovereign identity, the private key, in a tamper-proof manner. The private key is storage becomes volatile by...
By using [secure multiparty computation](https://en.wikipedia.org/wiki/Secure_multi-party_computation) it is possible to conduct calculations in the encrypted domain, the inputs of participants remain private. Homomorphic encryption is a more efficient mechanism. In 2014...