2020.2.17 / Publications
2020.1.27 / Posts
2020.1.15 / Publications
2020.1.6 / Publications
Our mission urges us to consider problems across multiple subject areas, both applied and theoretical. We pursue these problems in the open and share our results in recorded talks and published papers.Learn more
We aim to use learnings from previous efforts, growth in available data, and ambitions of qualitatively novel capabilities to facilitate the discovery, linking, and processing of knowledge. This work primarily consists of support for The Underlay, a project intending to build a global, distributed graph of public knowledge.
A long-term goal for the IPFS ecosystem is to merge distributed apps and local apps into a single paradigm: fundamentally rethinking the UNIX programming model for a content-addressable platform. As a component of this, we aspire to make the best use of state-of-the-art advances in programming language design and implementation, e.
We believe that privacy is a basic right and that individuals are entitled to own their identity. Our work on decentralised identity intends to develop portable, secure, and usable systems built on top of open standards (including the W3C DID specification).
Category theory (CT) originated as a subdiscipline of pure mathematics, with a historical strength in unifying disparate mathematical areas to transport proofs and constructions between them. CT can also be viewed as an upgraded foundation for all of math, taking the place traditionally occupied by first-order logic and set theory, and is commonly used in theoretical computer science (especially type theory), and as a foundation for computational theorem-proving.
Distributed systems are, broadly speaking, networked systems whose components are located in different nodes that communicate and coordinate to achieve the system's purpose. Distributed systems are at the very core of what we do and our interests extend across the entire field.
Modern cryptography plays an integral role in every aspect of online and electronic security, including providing evidence you're speaking to the intended party and hindering spying on the subsequent communication. Cutting-edge cryptography tools will allow the creation of incredibly strong evidence that general information processing has been performed in a privacy-preserving and trustless way.
We're a fully remote team distributed across the globe. We work with talented and intellectually curious people of diverse backgrounds and perspectives who share a passion for improving technology for humanity.