Get the latest tech news

Beaker Browser and the Dat Protocol


In this paper, I will introduce the Beaker browser and the Dat project upon which it is based. Then, I will critically analyze the design of the project using the principles and practices we have discussed throughout this course.

ISPs have gotten warier of letting people host from home, sometimes banning it There has been a global shift from desktops to more portable computers, like laptops, tablets, and phones pfraze: All true, though if you leak the private key, what will happen is that (due to lack of strict consensus between the leaked-key users) conflicting updates will be published, causing a detectable split history. This collision attack could theoretically be used agains the BLAKE2b hash function (Saarinen and Aumasson 2015) that Dat employs, as suggested by a researcher from Tsinghua University in Beijing (Hao 2015).

Get the Android app

Or read this on Hacker News

Read more on:

Photo of beaker

beaker

Photo of dat protocol

dat protocol

Photo of beaker browser

beaker browser

Related news:

News photo

What started out as trying to create soft, simulated organs for medical devices & surgical robots, gave us a touch-sensitive, shape-morphing 3D display. This device is about as big as a board game, can create pop-up patterns, manipulate objects across its surface, & shake a beaker of liquid.