Eternal Lotus (@lotusclan12) 's Twitter Profile
Eternal Lotus

@lotusclan12

Beggar by Day, Shitcoiner by Night

ID: 1208305019579056128

calendar_today21-12-2019 08:35:58

684 Tweet

24 Followers

106 Following

Poseidon (@poseidoncash) 's Twitter Profile Photo

We just shipped explosive multi-hop withdrawals on Solana. Your zkSNARK withdrawal gets split across 10-100 intermediate wallets (1-10 configurable hops × 10 wallets each) before reaching the final recipient. Privacy mixer meets parallel distribution.

We just shipped explosive multi-hop withdrawals on Solana. Your zkSNARK withdrawal gets split across 10-100 intermediate wallets (1-10 configurable hops × 10 wallets each) before reaching the final recipient. Privacy mixer meets parallel distribution.
Poseidon (@poseidoncash) 's Twitter Profile Photo

We submitted our entry to the Zypherpunk Hackaton Poseidon proves that Zcash-level privacy is possible on high-throughput chains like Solana. We built the first zkSNARK shielded pool on Solana, demonstrating that privacy doesn't require sacrificing speed or cost. We built a

We submitted our entry to the Zypherpunk Hackaton

Poseidon proves that Zcash-level privacy is possible on high-throughput chains like Solana. We built the first zkSNARK shielded pool on Solana, demonstrating that privacy doesn't require sacrificing speed or cost.

We built a
Cybyr (@cybyrtoad) 's Twitter Profile Photo

Largest Fart Pokèmon collection in the world 🤷‍♂️ $WEEZING let’s see what happens ca: 7gFduiNFdW7NAXR9VmEGzhE93XVPoMun81gJyJzBpump Kabuto King Omanyte Overlord

Poseidon (@poseidoncash) 's Twitter Profile Photo

Poseidon Wallet follows OWASP guidelines and Smart Contract Security Verification Standard (SCSVS) protocols in our internal audit process. We validate zero-knowledge proofs, test attack vectors through penetration testing, verify state integrity, and ensure emergency protocol

Poseidon Wallet follows OWASP guidelines and Smart Contract Security Verification Standard (SCSVS) protocols in our internal audit process. We validate zero-knowledge proofs, test attack vectors through penetration testing, verify state integrity, and ensure emergency protocol
Eternal Lotus (@lotusclan12) 's Twitter Profile Photo

What good is being a "real dev" if you're not around. The other one you called fake is about to break ath even after you fudded🤣. You stupid Useless piece of sh*t.