Prometheus (@nftyprometheus) 's Twitter Profile
Prometheus

@nftyprometheus

ID: 1092446830108045314

calendar_today04-02-2019 15:36:35

614 Tweet

70 Followers

0 Following

jules (@_juliarosenberg) 's Twitter Profile Photo

beyond excited to share the biggest @0xMetropolis announcement yet introducing PODARCHY EXPLORER: pod.xyz a visual interface for searching and exploring on-chain relationships

Tay 💖 (@tayvano_) 's Twitter Profile Photo

Mudit Gupta The wallets ****NOT***** affected by this: Ledger Trezor MM / MEW / MyCrypto / anything ethereumjs That said, if your SRP is from 2019 or before and has ever been on an online device (meaning it has ever existed in any form besides 1) your hardware wallet 2) paper then you

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

One application of AI that I am excited about is AI-assisted formal verification of code and bug finding. Right now ethereum's biggest technical risk probably is bugs in code, and anything that could significantly change the game on that would be amazing.

antiprosynthesis.eth ⟠ (@antiprosynth) 's Twitter Profile Photo

Bob Loukas 🗽 Also, as others pointed out, we may be heading into a reality where users don't even see the L2. They just see Ethereum, and the dapp frontend and intermediate protocols abstracts away the details, including the very concept of gas fees even.

Patrick Hansen (@paddi_hansen) 's Twitter Profile Photo

1/ Yesterday was a prime example of why crypto Twitter (and often crypto media) should not be trusted when it comes to crypto policy. Let's debunk claims that the EU is banning anonymous crypto transactions or self-custodial wallets. Here is what’s actually in the EU Anti Money

1/ Yesterday was a prime example of why crypto Twitter (and often crypto media) should not be trusted when it comes to crypto policy. Let's debunk claims that the EU is banning anonymous crypto transactions or self-custodial wallets.

Here is what’s actually in the EU Anti Money
Nick Percoco (@c7five) 's Twitter Profile Photo

As a security researcher, your license to “hack” a company is enabled by following the simple rules of the bug bounty program you are participating in. Ignoring those rules and extorting the company revokes your “license to hack”. It makes you, and your company, criminals.

𝚑𝚎𝚗𝚔 𝚟𝚊𝚗 𝚎𝚜𝚜 (@henkvaness) 's Twitter Profile Photo

Seven German journalism students tracked Russian-crewed freighters lurking off the Dutch and German coast—and connected them to drone swarms over military bases. digitaldigging.org/p/they-droned-… (1/6)

Seven German journalism students tracked Russian-crewed freighters lurking off the Dutch and German coast—and connected them to drone swarms over military bases.
digitaldigging.org/p/they-droned-… (1/6)
Daractenus (@daractenus) 's Twitter Profile Photo

To all my fellow Europeans looking to do the sensible thing and boycott everything US made, here's a platform with European alternatives to US digital services and products: european-alternatives.eu

Orla Joelsen (@ojoelsen) 's Twitter Profile Photo

Here is the official checklist from the Greenlandic authorities: Water 3 liters per person per day If applicable, water for pets. Food Food for five days that is long-lasting and easy to prepare. Hunting weapons, ammunition, fishing equipment. Medicine and First Aid Necessary

Joseph Young (@iamjosephyoung) 's Twitter Profile Photo

this is an incredible powerful chart for ethereum. ETH waiting to be staked is at record highs. and ETH waiting to unstake is at record lows.

this is an incredible powerful chart for ethereum.

ETH waiting to be staked is at record highs.

and ETH waiting to unstake is at record lows.