Dylan Kawalec

@yoZKyo

I help Open Source Developers Find opportunities. As a Tech Evangelist and Zero-Knowledge Proof researcher I assist web3 dApp developers find jobs & form teams

Joined on Nov 2, 2022

  • Revised Document: Substrate-Aleo Bridge with AIMBC-Bridge Pallet and CLI Tool Introduction This document outlines the process to create a parachain using Polkadot-SDK, develop the aimbc-bridge pallet, and build a CLI tool for Substrate-Aleo bridging via XCM. Part 1: Parachain Setup with Polkadot-SDK A. Substrate Core Components substrate-core: Essential for consensus, networking, and database functionalities. sp-runtime: Houses runtime libraries for state transitions. substrate-frame: Framework for constructing Substrate pallets.
     Like  Bookmark
  • ![](https://hackmd.io/_uploads/BJUk3oSj3.png)
     Like  Bookmark
  • Start Tutorial BNB React dApp ChallengeTesting Smart Contracts :100: Start Tutorial Recieve tBNB from the test-net faucet Write your smart contract, and deploy using Remix IDESave your contract's deployment contract address. Same for the ABI code. Create a folder in your workspace directory.
     Like  Bookmark
  • zkBNB zkBNB API Reference Guide Challenge name Objective Challenge Problem Mobile GameFi Build mobile games using Unity, Unreal, or Godot engines.
     Like  Bookmark
  • Hackathon Challenges are regularly updated before and after each BNB innovation loft, hackathon, and developer event. To stay informed about the latest challenges, be sure to check this page often. Our bounty hunters can participate in these challenges to earn rewards and contribute to the growth of the BNB ecosystem. Challenge name Objective Challenge Problem BNB Ai Use Ai with Smart Contracts in creative ways. Give an AI tool an account ID to make a deposit, transfer, or signature request. This AI should have a unique value proposition that justifies its use and manages assets on a user's behalf.
     Like  Bookmark
  • At BNB, our motto is 'Build and Build.' We firmly believe in the power of active development and growth to drive progress forward. That's why we're giving developers the opportunity to commit to their own issues raised on our Github repository - to foster a community of builders and creators who can push the BNB ecosystem forward together. ... Bounty Introduction Creating Bounties: Anyone can start a bounty in this repository by offering token rewards to those who complete it according to the specified guidelines. To get started, follow the instructions in the Read-This-Program file, and use the ISSUE_TEMPLATE to create your own bounty. ... Please read carefully through the guidelines to get a complete understanding of how bountys are created and discovered. Please provide feedback on our forum if you would like to suggest a stronger way to manage our bounty initiative.
     Like  Bookmark
  • Dylan Kawalec, Binance Technology Evangalist Security is everything, and it's a top priority for the entire organization. Everyone's role in Crypto is to build upon internal security, and it should be why anyone is able to work for the company to begin with. Security is a part of our culture Cryptocrats should be obligated to protect a massive repository of client risk management profiles as well as their private date about their client's personal identity information. There are general operations every crypto employee must follow to protect their organization. Crypto Security Protocols (P-TAD)
     Like 1 Bookmark
  • zkBNB - Bread and Butter zkBNB - Bread and Butter is an easy to understand guide to help you write smart contracts on the zkBNB chain. It uses metaphors, similies, and visualizations that will help you enjoy learning Solidity programming and avoid feeling like you're bashing your head against a wall. Building layer 2 scaling solutions is exciting and will add a lot of value to new and existing projects living in the BNB ecosystem. 🎅 Table of Contents Web 1.0 : This section provides a general overview of Solidity and Binance Smart Chain, including installation instructions and a review of fundamental concepts such as types, conditions, and functions.Covering the basics of blockchain ✅ Setting up your Binance Work Station ✅setting up a zkBNB project Breaking down variables and functions for BNB ✅
     Like 1 Bookmark
  • The best low budget podcasting set up In this article, I show you which tools are absolutley needs and some of the steps nessesary for creating your own podcast. Each section I list tools, and a brief explanation of how the tools piece togetehr with some of my own suggestions of how to best use them. I then explain how to properly present yourself, and how to stylize your podcast. I answer all the questions you didn't think you needed to ask yourself to help you stay on track. In the end, you should have walk away with -- Knowing all the tools and components that make up a podcast tips for making your podcast better A pretty good idea of how to make a professional podcast on a really low budget. What We need Microphone : Yetti / Yeticaster, later upgrade to XLR mic that plugs into an audio mixer. The Yeti or Yeticaster microphone and Logitech G Pro headset are both popular choices for podcasting.
     Like 1 Bookmark
  • Create your own template and add your "Project.md" file under the Application folder you forked and fill in as much of the information when submitting a pull request. Project Name: Name of your project Team Name: Legal name of your team Payment Address: Binance Smart Chain (BUSD/BNB) payment address. Please also specify the currency. (e.g. 0x8920... (BNB)) ⚠️ The combination of your GitHub account submitting the application and the payment address above will be your unique identifier during the Hackathon. Please keep them safe. Project Overview :page_facing_up: If this submission is in response to an RFP, please indicate this on the first line of this section.
     Like 1 Bookmark
  • Title pic, "privacy protections for Crypto crats" Crypto Industry | Privacy Protections 🔏 Table of Contents Why Privacy Matters What is privacy? Why should I care about data protection? Why is data protection important to my organization? By helping employees and Coworkers understand data protection and information security, you can reduce errors that often result in data protection incidents. Personal Information Recognizing personal data is a critical step in data protection. We'll need to review the concepts of sensitivity, identifiability, masking, aggregating and truncating to better recognize and process personal data. Handling Personal Information Data protection responsibilities begin the moment personal data enters your organization and continue until it is destroyed. Through a variety of scenarios, employees understand how to apply the data protection principles of transparency, consent, data minimization, purpose limitation, security and access throughout the information life cycle.
     Like 1 Bookmark
  • Using the Serde library to restructure Rust into JSON. Getting Set up For this tutorial, we'll be using Visual Studio Code. Start by opening your command line and follow along. First, you'll need to make sure you have rust installed on your machine if you don't already. curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh Create a new file in your workspace directory named 'Serde'. $cargo new Serde
     Like 1 Bookmark
  • Quick Set Up You'll want to tsc transpiler downloaded globaly. npm install -g typescript create a new typescript workspace folder. This is where all of your TS files will live. make a new directory in your TS workspace and open VSCode (code .) run git init and npm init run npm install
     Like 1 Bookmark
  • • Open Terminal. Navigate to Finder > Utilities and click on the Terminal app. You can also press Cmd + Space bar to activate Spotlight search and type 'Terminal.' • Set the directory. The next step is to set the destination of the files that you want to zip and password-protect. Type 'cd' and the location of the file or folder that you want to compress and encrypt. Type' cd downloads' if the file you're looking to compress is saved in the Downloads folder. • Compress and encrypt. Enter the command 'zip -er FILENAME.zip' without the quotes and replace FILENAME with what you want to name your encrypted zip file. Add a space and drag the file/folder to the Terminal window, and press Return. • Enter password. At this point, assuming everything's done right, you'll be prompted to enter and verify the password. Type the password you want to use and hit Return twice. Note that you won't see any characters on the command line when typing your password.
     Like 1 Bookmark