Episode 8 of Slow Portals
-
**Hello and welcome guests of the show!**
This doc has a quick walkthrough of the show notes, helpful links and a question bank of potential questions to ask on air.
Please feel free to make notes, ask Q's or correct anything you see.
Looking forward to our chat.
**Main thread:** Learnings from building self-contained hardware
**URL:** (https://twitter.com/i/spaces/1eaJbgrRERYxX)
**Date:** Tuesday, June 18th, 10AM@ Eastern Time
**Length:** 45 mins w/15 min overflow period
**Conversation Flow:**
- **Welcome and Intros** [2 min]
Hi and welcome. This is episode X of Slow Portals now steadily hosted on Twitter Spaces
- **Overview of the Namada rPGF program** [2 min]
So, why are we all here? These discussions have grown out of the Namada discord around an exhange of ideas such as how we think of privacy in our small corner of the internet, and what values the Namada community espouses. Y'know the Namada protocol is geared to kind of retrofit some privacy features onto other existing blockchains. Which is great at a protocol level, but what we've been discussing in the community is what kind of privacy narratives might these features enable, and how might it change how people actually think about their own right to privacy?
Today we are being joined by...
Key Points about Bunnie from BeTrusted:
Andrew "Bunnie" Huang is a prolific and notable builder and hardware enthusiast with a hacker background. known for tinkering with closed hardware systems (see The Hacktivist) documentary about his history with Xbox.
Quotes:
- it's mobile or nothing to solve the messaging problem
-
**Key Points about BeTrusted:**
- https://betrusted.io/
- https://www.crowdsupply.com/sutajio-kosagi/precursor#products
- What is the precursor, and how is it different from current main market devices?
- https://xobs.io/xous-support-tooling/
**Link to his nominations:**
https://forum.namada.net/t/rpgf-nomination-betrusted-project/65
Narrative
--
Is there a nucleas of something we can do, and do it really well. And p2p messaging seemed like the
High trust societies function well.
Possible Questions
--
**Questions about BeTrusted:**
Is operating secure hardware like really rigourous food prep - once something is tainted by a bad connection or malicious app, is it dead forever? Or is it just tainted momentarily and can be rescued?
- What did you use before this?
- What apps and wallets could someone use? How do people interface with daily activities?
- Who uses this? The "at risk end users" ?
- About the I/O problem -
- what's the relationship between xous, precursor, betrusted...make sure you know this map out
- who else is involved in "discerning technology"
-
**Spotlight Q:**
who's gunna force this into a must-have use case? ie. where is it a minimum standard?
**Questions about Namada:**
- What is the current status of Namada. What have you been working on recently?
- What is the problem that you think Namada is uniquely positioned to fix?
- How do you think of the information protection stack, and what could Namada change if it accomplishes what it set out to?