Hacker News new | past | comments | ask | show | jobs | submit login

Who operates those checkpoints? Isn't there going to be some sort of implicit trust there? Even if somehow you built a machine that executes instructions that is verified on the blockchain, how are you going to make sure that machine's firmware is secure?

edit: I think this is a valid thing to tackle potentially as a company, but right now it seems impossible.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: