GAGE
banner
g-age.bsky.social
GAGE
@g-age.bsky.social
Reposted by GAGE
not getting shot in the face by a government thug after dropping your kid off at a school is a kitchen table issue, probably the most talked about issue at kitchen tables right now honestly
January 9, 2026 at 1:00 PM
Fucking arrest the murderer.
I am aware of a shooting involving an ICE agent at 34th Street & Portland. The presence of federal immigration enforcement agents is causing chaos in our city. We’re demanding ICE to leave the city immediately. We stand rock solid with our immigrant and refugee communities.
January 9, 2026 at 4:18 AM
Reposted by GAGE
Peaceful vigil for Renee Good tonight in Seattle.
January 9, 2026 at 3:05 AM
Reposted by GAGE
Oh my gosh you guys! The House just passed my bill to extend the health care tax credits for three more years!
January 8, 2026 at 10:39 PM
If open, modular, auditable protocols like neogrid define the standards, not just FIPS, then everyone from Robinhood to local creators can build secure, fair access tools for public benefit systems like daily UBI.
January 8, 2026 at 11:16 PM
Fully Compliant: Neogrid meets FIPS 140-3 when `--fips-mode` is active.

Go-Friendly: Leverages Red Hat’s FIPS-validated Go for regulated components.

No Regressions: Internal DAG/zkDID still use modern crypto (Ed25519).
January 8, 2026 at 11:16 PM
Cutting-Edge Defaults: Neogrid prioritizes Ed25519/X25519/SHA-3 for most operations.

FIPS Readiness: Flip `--fips-mode` to switch to ECDSA P-256/SHA-256 for compliance.

Zero Bloat: STROBE and other experimental features are compile-time optional.
January 8, 2026 at 11:16 PM
Non-FIPS mode: Modern crypto (Ed25519, BLS).

FIPS mode: Only NIST-approved algorithms (ECDSA P-256, SHA-256).
January 8, 2026 at 11:16 PM
If only FIPS-certified monoliths are allowed to touch federal deposits, then:

Innovation dies,

Corruption thrives,

And people never see the full benefit of digital public goods.
January 8, 2026 at 11:16 PM
Implementing a VDF correctly is a highly specialized cryptographic task, and its security relies on mathematical conjectures that are not yet proven.
January 8, 2026 at 11:15 PM
VDF usage is scoped: its failure at worst re-orders some timestamps, not break signatures or logs.
January 8, 2026 at 11:15 PM
Identity & Security - Without ZK

B1[DIDs with Transparency]

B2[Ed25519 + Dilithium]

B3[VDF Anti-Sybil]
January 8, 2026 at 11:14 PM
Current VDF constructions, such as those based on groups of unknown order (like RSA groups), rely on widely accepted cryptographic assumptions that have held up against years of scrutiny, even if not "proven" in a pure mathematical sense. This is standard practice in applied cryptography.
January 8, 2026 at 11:14 PM
User App Layer (Cash App-like UI)

Protocol RPC API

Payment Channel Manager + zkProver

DAG Consensus with VDF Finality

SMT State Storage + MerkleLog Audit
January 8, 2026 at 11:14 PM
You may also explore batching multiple policy updates through a ring-buffer + single VDF gate to reduce overhead.
January 8, 2026 at 11:14 PM
The situation with VDFs is similar to much of modern cryptography, including the widely used RSA encryption system, whose security is based on the unproven conjecture that there is no efficient way to factor large numbers into primes.
January 8, 2026 at 11:13 PM
Frontend uploads image → stored in MerkleLog/IPFS

Triggers compute on DAG node (e.g., image classifier WASM)

Result → signed and stored in DAG

Access → governed by SMT policy (e.g., only followers can see)

Audit logs → shown to user, cannot be tampered with

No AWS usage needed
January 8, 2026 at 11:11 PM
The defense is broken down into several strong points, each backed by technical evidence:

Networking: We argue that Neogrid's use of Libp2p with zk-namespaced overlay nets provides stronger security guarantees than AWS VPC's logical segmentation by cryptographically enforcing every network hop.
January 8, 2026 at 11:10 PM
Focus on implementing NIST-approved algorithms with large keys; the qubit count isn’t your problem.
January 8, 2026 at 11:03 PM
PQC standards
January 8, 2026 at 11:00 PM
January 8, 2026 at 10:59 PM