Ed

E. de Smidt

3 records found

Authored

Periscope

Censorship-Resistant Off-Chain Traffic Tunnelling

There is an everlasting arms race between censoring bodies and those in its grip. When the censor is employing increasingly sophisticated techniques to digitally monitor and restrict those in its scope, equally sophisticated means to circumvent the digital repression come forward ...

Stop Boiling the Oceans

A Review on Energy Efficient Proof of Work Alternatives

Bitcoin’s underlying consensus algorithm, Proof of Work, is of inefficient nature. Due to the sheer size that Bitcoin has grown to over the recent years, power consumption has increased so much that the Bitcoin network has been estimated to consume more power than the whole count ...

Customer Verification Engine

Automated Customer Verification for a Peer-to-Peer Lending Platform

There is a lot involved in providing a loan as a company, mostly in terms of legalities and risk management. As a lender it is important to have a clear record of the customers applying for a loan, as this helps assessing the risk that comes with providing a loan. Furthermore, it ...