3,654 Matching Annotations
  1. Nov 2022
    1. I like triple entry stuff I'd Charles 00:05:33 purses thesis that all information is triadic symbols have to be linked to objects through interpret and human 00:05:46 interpret us others and the reason a I can do games so fantastically is this in game symbols and objects are the same so 00:05:59 the computer speeds can necessarily shuffle the symbols and the outcomes or the game but life isn't a game the map is not the territory and and the human 00:06:14 mind is central to the all creativity in the image of your Creator

      I like triple entry stuff

      tryadic symbols objects interpreted by human

      machines can do games

      because game symbols and objects are the same

    2. dr. Wright said earlier that he hopes to see a US dollar or British Pound on the 00:41:00 Bitcoin blockchain what's the likelihood you think that's gonna happen on bsv and I think you want to know what it's going to take to get there generally well I don't really see any other options 00:41:12 there's no other system that does it I mean and nasty and I'm patented all the solutions I mean yes the the Fed could actually still pay me for licensing the patents but in a way 00:41:26 that's actually still a good thing because that brings a whole lot of money into bsv and the American dollar still subsidizes Bitcoin so I mean you've got an option of them using Bitcoin and 00:41:38 scaling and doing fed coin or they can use my technology and then they can subsidize Bitcoin I don't mind either way

      oops fedcoin

    3. I'm still I'm still a little confused because of the know the whole if you create money as a 00:33:52 commodity that people can prosper by holding you nullify it as money it can't function as money that's right money is 00:34:05 as measured by its utility not by its market cap always coin market cap stuff is is really a delusion and in it and it 00:34:22 confuses people I think that it's good that Satoshi version doesn't have the market cap of coin market cap of BTC or 00:34:34 whatever it's that's a good sign you want you don't want money to be a commodity or an asset a speculative asset you want it to be a measuring 00:34:48 stick and that's I just hope that this industry understands this fundamental principle because if you create money that people want a hole you just 00:35:04 contradict the whole purpose of the endeavor you nullify your currency as money

      money as a commodity

      nullifies it's utility

      delusion

      want money as a measuring stick

    4. I don't agree with some of your bits on 00:31:21 III Ahmet cetera I think it mirrors an article that everyone knows the term but miss applies it from 1996 which was the wild wild web they were talking about 00:31:35 Usenet and other like basically a Redux of the penny share scams and the postal stamp scams of earlier eras and what 00:31:48 we're seeing in a lot of ico is the same thing this whole idea we don't need any regulation well you can create a regulated ico you can create something that actually works in all of this the 00:32:02 problem I see with icos is they're analogous to a web I pee oh and we're by POS were a big thing in the early internet days where people would basically create distributed web 00:32:17 companies which were partnerships and give out shares to everyone and all this stuff and there were tokens just you called them different things and there was even a Simpsons episode where Bart 00:32:30 was running his own internet company in IP owing and they had a toilet paper roll and like the guy was pulling out shares out of the toilet paper roll and Bart said I 00:32:44 need to go and he just pulls out their shares and goes off to the toilet giving an idea of what people thought about all of this before the dot-com crash because the value of a company is not whether 00:32:56 you have an idea it's how you execute it it's how you deliver it's how you actually build something of value to people so going up there and going I've got an idea I can have this rideshare taxi company that allows people to 00:33:10 basically have no controls or responsibility so that occasionally women can get raped in the back of cars and I can go not my fault you can say that's a great idea and that's probably 00:33:23 why they lost they're about to lose their license and whatever else here in London

      Usenet

      rideshare Simpson episode toilet paper roll

      unregulated

    5. we could have had eventually US dollar on top of Bitcoin and I hope to see that and 00:30:45 everyone goes oh no us all well I actually think that'd be a good thing imagine US dollar and pound on top of Bitcoin with an immutable stable ledger of how much value they have compared to 00:30:57 bit join over time we'll see how that actually applies
      • comment : Craig is visible shocked by hearing this
    1. Crypto wasn’t CRYPTOcurrency it was CRYPTOgraphy.Instead of sending money they were sending messages, privately...most of the time. You see, the math that once hid the most securemessaging between command/control and maritime vessels, nowsecures the funny little anime creatures on your phone.

      = cryptocosm

    1. As such, it provides exactly the solutions needed today: t

      = Holochain - provides : solutions needed today - data integrity - performance - required to support Web3's goal to - leave centralized corporate servers behind

      = IndyWeb - contrasted - instead of - leaving centralized corporate servers behind - integrate with, interoperate with, migration path to - limit the scope of harm/exploitation - stop disguising people as data - people own control their own - share in their own terms - interoperate with centralized apps - for the benefit of the participants

    2. It does not suffer from the scalability constraints of blockchain and global consensus

      = Holochain - not - suffer : - scalability constraints of blockchain - and global consensus

    3. critical feedback which has helped us address feature requirements, reliability challenges, and usability hurdles such that we are assured Holochain now has all the vital elements for building real Web3 apps.

      = provided : critical feedback - requirements - reliability challenges - usability hurdles

      = HoloChain - has : all vital elements build real Web3 apps

      = alternative vision for= Web3 Apps - in = IndyWeb - Web intent addressable capabilities - that come to people - to work on their own(ed) data - see = Pergoss App Model

    4. the same firm that audited Ethereum, Ethereum 2.0, Filecoin and many other projects with sophisticated decentralized architectures.

      = Least Authority - audited - Etherium, 2.0 - filecoin

    1. Least Authority@LeastAuthorityWe're committed to building & supporting the development of technology solutions that advance digital security and preserve privacy as a human right.Earthleastauthority.comJoined November 2011233 Following8,757 FollowersFollowed by PrivateStorage, StarkNet Maestro (zk, stark), and 7 others you follow

    1. Holochain@holochainAn end-to-end, open source, P2P app framework. Creating an ecosystem of decentralized apps with distributed, user-controlled storage.Globally Distributedholochain.orgJoined December 20162,512 Following136.2K FollowersFollowed by IOEN Tech, Myco, and 68 others you follow

      = following - twitter : @holochain - end-to-end - open source - p2p - app framerwork

      = creating = an ecosystem of apps - that are - decentralized - with - distributed - user-controlled-storage

      = constrast - with = IndyWeb - open - commons based - peer Co-created - emergent - networked - ambient - ubiquitous - born interoperable - inter(personal|communities) - build from trust for trust, but verify - Intentional Constellations - of - multi-player - evergreen - local first - off-line first - end-end-encrypted conversational - eco system of apps - player controlled owned - permanent - private - universal storage - networked capabilitiies

    1. Hidden wallet balance The confidentiality of all Zano transactions is hard-coded into the core. By concealing all sending and receiving addresses as we have maximized the level of privacy for every Zano user.

      = hidden wallet balance

    2. Untraceable Transactions The transactions between Zano network members are made untraceable with ring signatures and stealth addresses. Also, the way transaction data is stored on the blockchain allows access by authorized parties only, and none of the private data is ever publicly published.

      = untraceable transactions

    3. code design features like forward and backward compatibility, component-based modular structure, and asynchronous core architecture.

      = perfect design - forward and backward compatibility - component-based modular structure - and event driven - asynchronous core architecture

      = comment = just like the IndyNet/Web/Lab

      = for = IndyNet Design

    4. Secure.Scalable.Easy to UseZANO Zano is the development of a scalable and secure coin, with confidential assets support. The technology behind our blockchain provides reliability, security, and flexibility—a perfect option for p2p transactions.

      = perfect option for p2p transactions

    1. Escrow is a legal concept describing a financial agreement whereby an asset or money is held by a third party on behalf of two other parties that are in the process of completing a transaction. Escrow accounts are managed by the escrow agent.

    1. Crypto wasn’t CRYPTOcurrency it was CRYPTOgraphy. Instead of sending money they were sending messages, privately…most of the time. You see, the math that once hid the most secure messaging between command/control and maritime vessels, now secures the funny little anime creatures on your phone. For someone to truly understand the significance of ZANO I need to lay out the timeline of privacy blockchain technology and the reasoning behind blockchain project fruition.

      crypto

    2. Crypto wasn’t CRYPTOcurrency it was CRYPTOgraphy. Instead of sending money they were sending messages, privately…most of the time

      Crypto is not for currency it is cryptography

    1. Zooko Wilcox-O'Hearn 3rd degree connection 3rd Founder, CEO at Least Authority Enterprises Least Authority Enterprises Boulder, Colorado, United States

      Founder

    1. Our History In 2013 Least Authority’s founder Zooko Wilcox announced the launch of S4 in response to the Snowden leaks about the PRISM program. Several iterations and a partnership with Private Internet Access later, S4 evolved into PrivateStorage, which now is owned 100% by Least Authority.

    1. PrivateStorage implements privacy and security by design, not by policy. We cannot see your data when it is stored by us.

      = Privacy and security by design

    2. A free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar to Freenet, depending on the front-end used to insert and access files in the Tahoe system.

      = data store & distributed file system

    1. Winden is identity-free, meaning that senders and receivers don’t need to know each other’s identity to use it, or to reveal their identity to us.

      = identity-free - senders and receivers don't need to know - each other's identity - or reveal their identity to us

    2. Winden is a free web application for secure, fast, and easy file transfers between devices in real-time.

      = file transfer between devices - real time

    1. six perfections (paramitas) that benefit both oneself and others: benevolent generosity, ethical discipline, forbearing patience, enthusiastic perseverance, concentrative meditation, and discerning wisdom.

      six perfection paramitas

    2. This special awakening is what the bodhisattva strives to attain, deliberately choosing through his great compassion to remain in samsara and to renounce gaining salvation for himself alone. In other words, an aspiring bodhisattva wishes for awakening only as a means to bring about the positive welfare of other beings. Because of his love and compassion for all beings, the bodhisattva is never deterred by the suffering of samsara or any hardship that his altruistic efforts may entail. Fearless courage, therefore, particularly distinguishes a bodhisattva and is implicit in bodhicitta.

      fearless courage

    1. = experimenting - with = Annotating IndyLab archived pages - Archive Web Pages with IndyLab - ensure that hypothesis annotation is enabled - Use conversations on the margins of web pages - as portal to deeper collaboration - on associative complexes (aplexes for short) in an interpersonal - inter personal/community nexus

    1. This opens a new window with that URL, it set the focus to that windows, and as soon as the 'load' event is triggered, it executes the code in the function. It only works with a page in the same domain.

      load url and run script

    1. window.hypothesisConfig = function () { return { "openSidebar": true }; };

      = configure = hypothesis = client - using = JavaScript - embed.js - embded

    2. <script type="application/json" class="js-hypothesis-config"> { "openSidebar": true } </script>

      = enable = Hypothesis Annotation - open = sidebar

    1. However, itcannot be over-emphasized that our need for understanding is best served atthe higher level of abstraction; the advantage of a high-level language isnotational rather than computational. That is, it allows us to think andrepresent our algorithms in mathematical terms rather than in terms of themachine. It is after a clear understanding of the problem is attained that weshould begin thinking about representation.

      = need for understanding - best served at the = higher level of abstraction

      = advantage of high-level language

      • is = notational
      • rather then = computational
      • alows us to = think & represent = algorithms
      • in = mathematical terms ?
      • rather than in terms of the machine

      = after a = clear understanding of the problem is attained = begin - thinking about = representation

      Description

    1. The notion ofdirectness is also related to abstraction, in that if something is not done directly one should be able to abstract itto become direct. IP’s ―intentions‖ are such universal abstractions

      !- gloss : intentions - universal abstraction - express a specific implementation into its computational intent - achieve direct expression by abstracting it to become direct

      !- alt - gloss : coherent elaboration of the intentional structure intent vectors in Digital Spaces of the intented behaviour of the systenm we are building such that it introduces in a coherent complete forms all the effective concepts, computational and othere processes needed to exhibit behaviour of the system and or provide the desired results an, affordances for human experience

      • recall : 'Taint what u do but the way that u do it, that's what gets result

      = beyond = programming languages - is = Effective Articulation of Intent - get your conceptualization of intentions right through mutual learning and conversation - then Software and the processes they enable will take care of themselves - as a Conversations about intents, purposes, processes, - through a process mutual learning and articulation

  2. bafybeics2dzel7n2lh2un5i7kxlddzbgtmdhonyrsglei3sjqm5wbta574.ipfs.w3s.link bafybeics2dzel7n2lh2un5i7kxlddzbgtmdhonyrsglei3sjqm5wbta574.ipfs.w3s.link
    1. use the computer for what it is, a “universal modelling machine

      = universal modelling machine

      = engine of co-creative symmathesy

      'cause interpretation is everything

      attention and CARE

      not the other way round

    1. László motivates conscious life-forms and informed evolution solvingseveral problems that emerge from quantum physics, especially non-locality and quantumentanglement. In TDVP there is the initial tethering of C-substrate with S-substrates and T-substrates. Laszlo’s concept of the preconditions has some similarity, but without the tetheringof all reality

      = conscious life-forms = informed evolution =

      https://twitter.com/TrailMarks/status/1594983639523418113

      Description

    1. Ageless Software evolves, to meet new requirements, without reducing its efficiency or understandability. Here we introduce a methodology called Informed Evolution for supporting the construction and evolution of ageless software.

      = informed evolution - software

    1. promotes a linking of non-government organizations promoting sustainable development, using the Internet.
      • linking non-government organizations
      • sustainable development
      • using the internet

      = for = IndyWeb

    2. centre attention on the evolution of human values and consciousness as the crucial factors in changing course — from a race towards degradation, polarization and disaster to a rethinking of values and priorities so as to navigate today's transformation in the direction of humanism, ethics and global sustainability".

      Club of Budapest

    3. Ervin László ([ˈɛrvin ˈlaːsloː]; born 12 June 1932) is a Hungarian philosopher of science, systems theorist, integral theorist, originally a classical pianist. He is an advocate of the theory of quantum consciousness.

    1. now i need to clean it how much time do you invest in cleaning 00:06:03 it roughly the same amount of time it took you to write

      how long does it take to cleaning your code

      as long as long it took u to write it

    2. the fact that you got it working is only half the job 00:05:23 once the code works that's when you have to clean it no one writes clean code first nobody does because it's just too hard to get code to work so once the code works it will 00:05:37 be a mess human beings do not think in nice straight lines they don't think in if statements and while loops they cannot foresee the entire algorithm so we piece the thing together we cobble it together 00:05:50 with wire and scotch tape and then it suddenly works and we're not quite sure why and that's the moment when you say all right now i need to clean it how much time do you invest in cleaning 00:06:03 it roughly the same amount of time it took you to write it and that's the problem nobody wants to put that effort in because they think they're done when it works 00:06:13 you're not done when it works

      You are not done when it works!

    1. The communications device must be as available (in every way) as a slide rule. The service must not be esoteric to use. (It must be learnable in private.) The transactions must inspire confidence. (Kindness should be an integral part.)

      = communication device - must be available

      = service - must not be esoteric - learnable in private

      = transactions - inspire confidence - kindness integral part

      = comment - = transaction/interactions - must - delight

    2. look at a computing engine not as a device to solve differential equations, nor to process data in any given way, but rather as an abstraction of a well-defined universe which may resemble other well-known universes to any necessary degree

      = computational universes - resemble other well-known universes

    3. Not being able to solve any one scientist's problems, they nevertheless feel that they can provide tools in which the thinker can describe his own solutions and that these tools need not treat specifically any given area of discourse

      = universal nature of information processing - requires universal solutions - where 'universal' ion the sense of a "universal machine" or 'universal function' as exemplified with LISP eval/apply mutual recursion

    1. IPFS and NDN share the same vision, that of content-addressable networks, but approach it from vastly different perspectives. NDN is a native network-layer approach, while IPFS is an application-layer approach.

      = share - vision = content-addressable networks - perpecives - network-layer - for = NDN - application-layer - for - IPFS

    1. The Bardo Thodol (Tibetan: བར་དོ་ཐོས་གྲོལ, Wylie: bar do thos grol, "Liberation Through Hearing During the Intermediate State"), commonly known in the West as The Tibetan Book of the Dead

      = Bardo Thodol - translated as = Liberation Through Hearing During the Intermediate State - commonly know - in the west - as the : Tibetian Book of the Dead

      https://upload.wikimedia.org/wikipedia/commons/e/e3/BardoThodolChenmo.jpg

    1. be able to run entire virtual worlds like actually put in a game like Minecraft um I think this isn't normally a gif but a PDF doesn't support GIF yet so I won't 00:18:41 be able to see the GIF but imagine being able to have an entire virtual world like Minecraft and all of the interactions of the players in that speed being able to be tracked with the 00:18:53 hard verifiability of um of consensus in a blockchain setting so like that's where we're headed

      = run virtual worlds - like MineCraft - all the interactions of the player - tracked with verifiability of consensus - in a blockchain setting - at speed - massive scale computations - all the shards of the world that players want to polay

    2. I've been hoping to talk about this for a long time this is a really like a long-term bit of work for a lot of us um the um the consensus lab in general has been 00:00:16 um pioneering a ton of like amazing contributions to the ecosystem in terms of scaling in a bunch of different ways and this one I think is going to be one of the greatest contributions that this lab is going to make um to the whole blockchain space

      long time comming

      greatest contribution to the blockchain space

      and beyond

      = comment - seen this potential from the word GO - blockchain with its global consensus with Distributed Ledger needs Distributed Hash Tables to scale consensus and reach

    3. massive scale data science um all of this sort of coordinated and think of all the data pipelines um built with IPC

      = massive scale data science - with InterPlanetary Concensus

    4. you could do 00:12:48 traditional backends in a web 3 sort of sense um with optimistic or zero knowledge proof based verifiability which might be very secure verifiability to be a bit expensive but you you make it up in the scale out so by being able to Fan out 00:13:01 and have so many computers you can pay off a few orders of magnitude in running a traditional standard web app backend in the zero knowledge setting

      = can do = traditional back ends in web 3 - optimistic or zero knowledge proof based verify-ability - could be bit expensive - but pay off a few orders of magnitude in scale out - run subnets - in running a traditional standard web app back end - zero knowledge setting

    5. there's this consensus bottleneck where you're trying to push in tons of amounts of of transactions you everything is getting bottlenecks

      = consensus bottleneck

    6. permissionless 00:02:02 large-scale Byzantine fault tolerant networks that have an economic construction within them um it's a much stronger way of building um digital resistance and applications but we need to make them scale
      • permissionless
      • large-scale Byzantine fault tolerant
      • economic incentives
    7. why Bitcoin was an ethereum and so on were sort of like disregarded by the traditional Cloud people because it just kind of seemed crazy that you know a transactional system that could do only 00:01:49 a fraction of what your phone could do was going to run the entire monetary system

      disregarded by the traditional cloud

      transactional systems

    8. it gives you Byzantine 00:00:43 fault tolerant tolerance in a very nice scalable setting and it has very nice properties for a lot of classic distributed systems applications and so you can think of doing cluster management and large-scale computational 00:00:57 arrangements

      fault tolerance

      in scaleable settings

      nice properties for distributed systems

    9. let's talk about the interplanetary 00:06:31 principle it's something that the professor Community came up with and the idea is like um you know if you remember the end-to-end principle that says that

      interplanetary principle

      end to end principle professor Community came up

    10. inside networks um you want to keep things dumb and stateless the endpoints have to do all 00:06:44 the work

      keep things dumb in the network

      end points should do all the work

    11. if you were doing something simpler you could have a much simpler protocol if you were just kind 00:06:19 of like trying to do like um you know log machine replication or something like that or having eventually consistent structures and whatnot like if you want to be able to like have hard security um that's a much harder problem

      log replication eventual consistent structures

    12. outside of a blockchain context because it gives you Byzantine 00:00:43 fault tolerant tolerance in a very nice scalable setting and it has very nice properties for a lot of classic distributed systems applications and so you can think of doing cluster management and large-scale computational 00:00:57 arrangements

      outside of a block chain context

    1. the morphic graphics model that I'll be working with came also John McCarthy's half-page Lisp 00:01:02 eval is just the perfect example of meta-circular programming

      = meta-circular programming

    1. The summum bonum is simply that numbers are ideas (mental constructs representing a perception, and in that sense, they do exist platonically). As has already been very well explained, these ideas are useful for describing the world around us, and so we continue to use and improve upon these ideas.

      numbers just ideas?

    1. “Software should be as easy to edit as a PowerPoint presentation,” Simonyi asserts. That means giving it just as intuitive an interface.

      software simple

    1. We're here at QCon London 2010 and I'm sitting here with Dan Ingalls. Dan, why don't you explain to us what you've been doing for the last 40 years?

      Dan What have you been doing for the past 40 (by now 50) years

    1. IPFS is an ambitious vision of new decentralized Internetinfrastructure, upon which many different kinds of applica-tions can be built

      = decent(ralized) Internet infrstructure

    2. Object content addressing constructs a web

      = constructs = Object content addressing =a Web - significant bandwidth optimization - untrusted content serving - permanent links - ability to make full permanent backups of - any objects & its references

      = comment = for = IndyPLEX - nodes with all - outgoing and incoming - qualified links and target references

      Fundamental Unit of coherent local complete structured information pervasive and universal across all computstion and communication and exhange and storage

      made permanent via IPFS

      permanence ensured by human readable composite naming conventions that the access and qualifying structure of links, forming shapes

      slef-organizing, self-revealing, co-evolving conten in contexts exchanged in trust networks with full provenance

    3. Without it,all communication of new content must happen off-band,sending IPFS links.
      • all communication must happend off band
      • by sending IPFS links

      = comment = for : IndyWeb - instead of mutable names - rely on off-band interpersonal trust networks - themselves maintained using IPNS instead of making data mutable make the capability in use mutable with permanent names

    4. epresent arbi-trary datastructures, e.g. file hierarchies and commu-nication systems.

      = arbitrary = datastructures - file hierarchies - communication systems

      = consider - for = IndyWeb - linked computational capabilities / interpretations

    5. S/Kademlia [1] extends Kademlia to protect against ma-licious attack

      = section = S/Kadmelia - extends Kadmelia - protect against = malicious nodes

    6. finding nearby data without querying distant nodes” [5]and greatly reducing the latency of lookups.

      = finding nearby = data - wiithout - querying distant = nodes

    7. Coral relaxes the DHT API

      = relaxes = DHT API = Coral - sloppy in DSHT - need only a single working peer - can distribut only subset of the values to the nearest nodes - avoiding hot-spots

    8. Kademlia stores values in nodes whose ids are “nearest

      = stores values = Kadmelia - in nearest nodes - not application data locality - ignores far nodes that may have the data

      = stores addresses of peers = Coral - can provide data blocks

    9. Efficient lookup through massive networks: queries onaverage contact dlog2(n)e nodes. (e.g. 20 hops for anetwork of 10, 000, 000 nodes)

      = efficient lookup - through - massive networks - queries on asverage contact log2(n) nodes - 20 hops for a network of 20 million nodes

    10. The central IPFS principle ismodeling all data as part of the same Merkle DAG

      = central - principle - is - modelling all data as - part of the same Merkle DAG

    11. Careful interface-focused integration yields a system greaterthan the sum of its parts.

      = careful interface-focused integration - yields = system greater than the sum of its parts

    12. New solutions inspired by Gitare emerging, such as Camlistore [?], a personal file stor-age system, and Dat [?]

      = new solutions - inspired by = Git - camlistore - reanamed = perkeep = personal file storage system = Dat

      = comment - missing = Named Data Networks

    13. What remains to be explored is how this datastructure can influence the design of high-throughput ori-ented file systems, and how it might upgrade the Web itself.

      = explore = data structures - influence = design - of - high throughput oriented file systems - might upgrade the Web

    14. its content addressedMerkle DAG data model enables powerful file distributionstrategies

      = has = Git - content addressed = Merkle DAG = data model

    15. Orthogonal to efficient data distribution, version controlsystems have managed to develop important data collabo-ration workflows

      = orthogonal to data distribution = collaboration workflows

    16. Pressed by critical features and bandwidth con-cerns, we have already given up HTTP for different datadistribution protocols.

      web given up

      for other distribution protocols

    17. boiled down to “lots of data, accessible ev-erywhere.

      "lots of data, accessible everywhere"

      = comment : Data - Godlike - omnipresent - eternal - omnipotent

    18. But we are enter-ing a new era of data distribution with new challenges

      = new - challenges = data distribution hosting - petabyte datasets - - computing - on - large = data - across = organizations - high- - volume - definition - on demand - realtime media streams - versioning and linking massive datasets - preventing accidental disappearance if important files

  3. web.archive.org web.archive.org
    1. Kernel is eight weeks of conversation in a "block" of 250 brilliant people intended to connect creativity with care

      = what is? = Kernel - 8 weeks of conversations - 250 people - intended to - connect = creativity - with - care

    1. When you lose interest in a program, your last duty to it is to hand it off to a competent successor.

      = have = the duty - to find = a scucessor

    1. The web is more a social creation than a technical one

      the current web is shaped by the properties and affordances that as a protocol it engenders.

      Location Addressing is a key feature and it naming system shaped it, and constrains all our nontechnical endevaours

    1. works similar to Android Intents, and it's a good example of how Capyloon is putting the user's experience first and creating a permissionless interface

      a new way of doing Web Intents

    2. UCANs and WNFS and how they can enable decentralized identity encrypted at rest file storage
      • User Controlled Authentication
      • WebNative File system
      • decentt(ralized) identity
    3. only requires HTML, CSS, and JavaScript to work. This made apps much more portable and didn't require developers to specialize in one walled garden.

      not walled gardens