I'm not: A researcher, theorist, or open systems expert.I am: Someone who's been inthe space for awhile, (since the Frontier network exactly) and have written a fairly complex Dapp myself.
Permission the source => Kill exploits?
I know it's a radical notion. But even if you only have to register a KYC'd address to get a read-only, non-copiable, annotations enabled (yeah I know it's not fool-proof I'm spitballing) view of the source. Tell me why this idea should not be considered and be stricken from the earth...
As an addendum: Any external calls or sends must be published or generate verifiable documentation.
Important: This would never be enshrined in Ethereum. This is an exploration of a potential ERC, which is an optional standard
[link] [comments]
You can get bonuses upto $100 FREE BONUS when you:
π° Install these recommended apps:
π² SocialGood - 100% Crypto Back on Everyday Shopping
π² xPortal - The DeFi For The Next Billion
π² CryptoTab Browser - Lightweight, fast, and ready to mine!
π° Register on these recommended exchanges:
π‘ Binanceπ‘ Bitfinexπ‘ Bitmartπ‘ Bittrexπ‘ Bitget
π‘ CoinExπ‘ Crypto.comπ‘ Gate.ioπ‘ Huobiπ‘ Kucoin.
Comments