aboutsummaryrefslogtreecommitdiff
path: root/articles
diff options
context:
space:
mode:
Diffstat (limited to 'articles')
-rw-r--r--articles/ui/ui.tex19
1 files changed, 10 insertions, 9 deletions
diff --git a/articles/ui/ui.tex b/articles/ui/ui.tex
index 943264a98..5e4cf2099 100644
--- a/articles/ui/ui.tex
+++ b/articles/ui/ui.tex
@@ -445,20 +445,21 @@ there are numerous seemingly fragile aspects of the BOLT protocol,
including aborts deanonymizing customers, intermetdiaries risking
unlimited losses, and theft if a party fails to post a refute message
in a timely fashion.
-% If these issues could be addressed,
+% Of course, Taler itself could be used to provide a side-chain like technology
+% Assuming these issues can be addressed,
% % and the relatively advanced crypto involved became production ready,
-% then Taler might be the best platform for deploying a BOLT-like scheme.
+% Taler might prove a better platform for deploying a BOLT-like scheme
+% than Zerocoin.
+
% In addition, the Bitcoin protocol does not interact well with
% conventional anonymity networks like Tor \cite{BTC:vsTor}
-
% dark pools?
-% mining suck0rs,
-
-% DDoS : wired article?
-
-% economic ideology
+% outdated ideas :
+% mining suck0rs,
+% DDoS : wired article?
+% economic ideology
\subsection{Walled garden payment systems}
@@ -550,7 +551,7 @@ hold, and spend coins. Wallets also manage the customer's accounts
at the exchange, and keep receipts in a transaction history. Wallets can be
realized as browser extensions, mobile Apps or even in custom
hardware. If a user's digital wallet is compromised, the current
-balance may be lost, just like with an ordinary wallet with cash.
+balance may be lost, just like with an ordinary wallet containing cash.
\begin{figure}[t!]%[36]{R}{0.5\linewidth}