<H1> Vitalik Buterin's website </H1> |
<H3>
Why sharding is great: demystifying the technical properties
</H3> |
<H3>
Gitcoin Grants Round 9: The Next Phase of Growth
</H3> |
<H3>
The Most Important Scarce Resource is Legitimacy
</H3> |
<H3>
Prediction Markets: Tales from the Election
</H3> |
<H3>
An approximate introduction to how zk-SNARKs are possible
</H3> |
<H3>
Why we need wide adoption of social recovery wallets
</H3> |
<H3>
An Incomplete Guide to Rollups
</H3> |
<H3>
Endnotes on 2020: Crypto and Beyond
</H3> |
<H3>
Convex and Concave Dispositions
</H3> |
<H3>
Why Proof of Stake (Nov 2020)
</H3> |
<H3>
Gitcoin Grants Round 7 Retrospective
</H3> |
<H3>
Coordination, Good and Bad
</H3> |
<H3>
Trust Models
</H3> |
<H3>
A Philosophy of Blockchain Validation
</H3> |
<H3>
Gitcoin Grants Round 6 Retrospective
</H3> |
<H3>
Exploring Fully Homomorphic Encryption
</H3> |
<H3>
Gitcoin Grants Round 5 Retrospective
</H3> |
<H3>
A Quick Garbled Circuits Primer
</H3> |
<H3>
Review of Gitcoin Quadratic Funding Round 4
</H3> |
<H3>
Base Layers And Functionality Escape Velocity
</H3> |
<H3>
Christmas Special
</H3> |
<H3>
Quadratic Payments: A Primer
</H3> |
<H3>
Hard Problems in Cryptocurrency: Five Years Later
</H3> |
<H3>
Review of Gitcoin Quadratic Funding Round 3
</H3> |
<H3>
In-person meatspace protocol to prove unconditional possession of a private key
</H3> |
<H3>
Understanding PLONK
</H3> |
<H3>
The Dawn of Hybrid Layer 2 Protocols
</H3> |
<H3>
Sidechains vs Plasma vs Sharding
</H3> |
<H3>
Fast Fourier Transforms
</H3> |
<H3>
Control as Liability
</H3> |
<H3>
On Free Speech
</H3> |
<H3>
On Collusion
</H3> |
<H3>
[Mirror] Cantor was Wrong: debunking the infinite set hierarchy
</H3> |
<H3>
A CBC Casper Tutorial
</H3> |
<H3>
[Mirror] Central Planning as Overfitting
</H3> |
<H3>
Layer 1 Should Be Innovative in the Short Term but Less in the Long Term
</H3> |
<H3>
A Guide to 99% Fault Tolerant Consensus
</H3> |
<H3>
STARKs, Part 3: Into the Weeds
</H3> |
<H3>
On Radical Markets
</H3> |
<H3>
Governance, Part 2: Plutocracy Is Still Bad
</H3> |
<H3>
Notes on Blockchain Governance
</H3> |
<H3>
A Quick Gasprice Market Analysis
</H3> |
<H3>
STARKs, Part II: Thank Goodness It's FRI-day
</H3> |
<H3>
STARKs, Part I: Proofs with Polynomials
</H3> |
<H3>
On Medium-of-Exchange Token Valuations
</H3> |
<H3>
A Prehistory of the Ethereum Protocol
</H3> |
<H3>
A Note on Metcalfe's Law, Externalities and Ecosystem Splits
</H3> |
<H3>
The Triangle of Harm
</H3> |
<H3>
On Path Independence
</H3> |
<H3>
Analyzing Token Sale Models
</H3> |
<H3>
Engineering Security Through Coordination Problems
</H3> |
<H3>
Hard Forks, Soft Forks, Defaults and Coercion
</H3> |
<H3>
A Note On Charity Through Marginal Price Discrimination
</H3> |
<H3>
[Mirror] Zk-SNARKs: Under the Hood
</H3> |
<H3>
[Mirror] Exploring Elliptic Curve Pairings
</H3> |
<H3>
[Mirror] A Proof of Stake Design Philosophy
</H3> |
<H3>
[Mirror] Quadratic Arithmetic Programs: from Zero to Hero
</H3> |
Social
Social Data
Cost and overhead previously rendered this semi-public form of communication unfeasible.
But advances in social networking technology from 2004-2010 has made broader concepts of sharing possible.