Oskar
- Jul 19 2019
P2P Data Sync for MobileA research log. Reliable and decentralized, pick two.
- Aug 02 2019
Vac - A Rough OverviewVac is a modular peer-to-peer messaging stack, with a focus on secure messaging. Overview of terms, stack and open problems.
- Oct 04 2019
P2P Data Sync with a Remote LogA research log. Asynchronous P2P messaging? Remote logs to the rescue!
- Nov 08 2019
Feasibility Study: Semaphore rate limiting through zkSNARKsA research log. Zero knowledge signaling as a rate limiting mechanism to prevent spam in p2p networks.
- Dec 03 2019
Fixing Whisper with WakuA research log. Why Whisper doesn't scale and how to fix it.
- Feb 14 2020
Waku UpdateA research log. What's the current state of Waku? How many users does it support? What are the bottlenecks? What's next?
- Apr 16 2020
What Would a WeChat Replacement Need?What would a self-sovereign, private, censorship-resistant and open alternative to WeChat look like?
- Jul 01 2020
What's the Plan for Waku v2?Read about our plans for Waku v2, moving to libp2p, better routing, adaptive nodes and accounting!
- Sep 28 2020
Waku v2 UpdateA research log. Read on to find out what is going on with Waku v2, a messaging protocol. What has been happening? What is coming up next?
- Nov 10 2020
[Talk] Vac, Waku v2 and Ethereum MessagingTalk from Taipei Ethereum Meetup. Read on to find out about our journey from Whisper to Waku v2, as well as how Waku v2 can be useful for Etherum Messaging.
- Aug 06 2021
[Talk at COSCUP] Vac, Waku v2 and Ethereum MessagingLearn more about Waku v2, its origins, goals, protocols, implementation and ongoing research. Understand how it is used and how it can be useful for messaging in Ethereum.
- Nov 04 2022
Building Privacy-Protecting InfrastructureWhat is privacy-protecting infrastructure? Why do we need it and how we can build it? We'll look at Waku, the communication layer for Web3. We'll see how it uses ZKPs to incentivize and protect the Waku network. We'll also look at Zerokit, a library that makes it easier to use ZKPs in different environments. After reading this, I hope you'll better understand the importance of privacy-protecting infrastructure and how we can build it.