Hacker News new | past | comments | ask | show | jobs | submit login

Regardless of the actual coin, where's the tooling for the enduser to do this verification? They go to there computer and... what happens?

This has to be built by someone, and then that has to be trusted. I can't imagine many people wanting to do such a thing on any side...




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: