Question: isn’t the fingerprint data just stored on the hardware register and equality checked anyway? No, a hashed version is stored. Input is hashed to check it against it. In a secure “sandboxed” region called the security enclave only part of fingerprint, not whole thing (a sample) How do you create a sandbox in hardware?
Relevant to distributed computing and blockchain Two generals problem: loyal and traitor generals each command an army The only communications they have are through messages that have latency and failure Two choices: Attack or stay put How do you create an algorithm, such that loyal generals follow it, while traitors do not, such that the imperfect group can complete the mission?
clever arbitrage also involving a smart contract bug flashloan 10k eth from dYdX hoard 112 WBTC by compound borrowing with 5500 ETH margin trade sETHwBTC “meta” market. Think of stock short like Apple-USD Drive up wBTC and shit on ETH.
From this ELI5 https://www.reddit.com/r/learnprogramming/comments/t6y74/eli5_what_is_llvm_can_it_be_used_for_general/
Normally source code to assembly
LLVM is a middleman VM that can make things easier on both ends (source code to LLVM, LLVM to assembly)
Commitment schemes remind me of differential privacy, and the XOR trick learnt in competitive programming (XOR a set of numbers that all have a duplicate except one).
Suppose you want to generate a random number that nobody can predict (AKA a random number).