I'm not: A researcher, theorist, or open systems expert.I am: Someone who's been inthe space for awhile, (since the Frontier network exactly) and have written a fairly complex Dapp myself.
Permission the source => Kill exploits?
I know it's a radical notion. But even if you only have to register a KYC'd address to get a read-only, non-copiable, annotations enabled (yeah I know it's not fool-proof I'm spitballing) view of the source. Tell me why this idea should not be considered and be stricken from the earth...
As an addendum: Any external calls or sends must be published or generate verifiable documentation.
Important: This would never be enshrined in Ethereum. This is an exploration of a potential ERC, which is an optional standard
[link] [comments]

You can get bonuses upto $100 FREE BONUS when you:
💰 Install these recommended apps:
💲 SocialGood - 100% Crypto Back on Everyday Shopping
💲 xPortal - The DeFi For The Next Billion
💲 CryptoTab Browser - Lightweight, fast, and ready to mine!
💰 Register on these recommended exchanges:
🟡 Binance🟡 Bitfinex🟡 Bitmart🟡 Bittrex🟡 Bitget
🟡 CoinEx🟡 Crypto.com🟡 Gate.io🟡 Huobi🟡 Kucoin.
Comments