Hacker News new | past | comments | ask | show | jobs | submit login

Another thing that makes it hard I think is that these are all by necessity multi-agent protocols/algorithms. How should we unambiguously describe and specify them? Well verbal verbiage is not very formal.

Maybe something like: https://en.wikipedia.org/wiki/Specification_and_Description_...

What makes this all rather critical is that these are security procedures and, and complexity is the foe of security.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: