@nutty.land / @nuttycom@icosahedron.website (@nuttycom) 's Twitter Profile
@nutty.land / @[email protected]

@nuttycom

Haskell, climbing, blacksmithing. I work on Zcash at electriccoin.co, and hack on aftok.com. Informed by anarchism,🛡️ He/him, I do not identify.

ID: 16436452

linkhttp://nuttycom.github.io calendar_today24-09-2008 16:18:32

40,40K Tweet

3,3K Takipçi

751 Takip Edilen

Debasish (দেবাশিস্) Ghosh 🇮🇳 (@debasishg) 's Twitter Profile Photo

Along with reading papers on database internals, I also try to look up the implementations of many of them. For me, one of the main takeaways is that you get to know the implementations of production quality data structures that perform at scale. In almost all cases you will find

NEAR DevHub (@neardevhub) 's Twitter Profile Photo

We're thrilled to announce the Zcash 🛡️ X NEAR Intents hackathon winners powered by @HackboxHQ. Check out the project winners of three prizes of $15K each: 🧵👇

Adam McBride (@adamamcbride) 's Twitter Profile Photo

Before 1960, nearly all transactions were private, using cash with no digital trace. Private transactions were the norm for thousands of years of human history, relying on direct exchanges without third-party oversight. There’s nothing suspicious or wrong about them, and

Maia (@maiamindel) 's Twitter Profile Photo

You can get hard, concrete proof that parliamentary systems are superior because the Trump Crash and the Truss budget crisis were basically the same and one resulted in the head of state serving less than 3 weeks and the other will be in charge for 196 more weeks

nick.eth (@nicksdjohnson) 's Twitter Profile Photo

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:
nick.eth (@nicksdjohnson) 's Twitter Profile Photo

Finally, they forward the message to their victims. Because DKIM only verifies the message and its headers and not the envelope, the message passes signature validation and shows up as a legitimate message in the user's inbox - even in the same thread as legit security alerts.

nick.eth (@nicksdjohnson) 's Twitter Profile Photo

I've submitted a bug report to Google about this; unfortunately they closed it as 'Working as Intended' and explained that they don't consider it a security bug. Obviously I disagree - but until they change their mind, be on the lookout for deceptive security alerts from Google.

I've submitted a bug report to Google about this; unfortunately they closed it as 'Working as Intended' and explained that they don't consider it a security bug. Obviously I disagree - but until they change their mind, be on the lookout for deceptive security alerts from Google.
Christopher Ho (@chr1stopherho) 's Twitter Profile Photo

A $1 billion company has operated for 53 years with ZERO managers. Workers buy $500,000 machines without approval. Hire their own colleagues. Set their own salaries. And they're outperforming every competitor in their industry. The coolest company you've never heard of 🧵

A $1 billion company has operated for 53 years with ZERO managers.

Workers buy $500,000 machines without approval. Hire their own colleagues. Set their own salaries.

And they're outperforming every competitor in their industry.

The coolest company you've never heard of 🧵
Christopher Ho (@chr1stopherho) 's Twitter Profile Photo

Here's the delegation paradox that Morning Star exposes: When you give people complete freedom WITH accountability, they don't become chaotic—they become more disciplined. In their system, one broken commitment impacts peers directly, creating natural regulation.

Here's the delegation paradox that Morning Star exposes:

When you give people complete freedom WITH accountability, they don't become chaotic—they become more disciplined.

In their system, one broken commitment impacts peers directly, creating natural regulation.
Christopher Ho (@chr1stopherho) 's Twitter Profile Photo

Several companies have tried to copy Morning Star's model and failed. W.L. Gore succeeded by capping units at 200 people so peer networks remained effective. Zappos tried with Holacracy and faced massive employee exodus. What's the difference? Culture built on genuine trust.

Tay 💖 (@tayvano_) 's Twitter Profile Photo

Oh good apparently now the Coinbase breach happened on Dec 26, 2024. LOL So since Coinbase won't be straight with you, I will. Threat actors had ongoing access via multiple insiders over a prolonged period of time. maine.gov/agviewer/conte…

Oh good apparently now the Coinbase breach happened on Dec 26, 2024.

LOL

So since Coinbase won't be straight with you, I will. 

Threat actors had ongoing access via multiple insiders over a prolonged period of time.

maine.gov/agviewer/conte…
Maya Protocol (@maya_protocol) 's Twitter Profile Photo

🛡️IT’S OFFICIAL: Zcash 🛡️ x Maya Protocol You asked. You waited. And now… It’s finally here! 🚀Maya now supports private cross-chain swaps with Zcash! Get your privacy on. Check out our blog and dive into the details: mayaprotocol.com/blog-maya-acad…