
johnx
@johnx25bd
Followers
2K
Following
4K
Media
152
Statuses
2K
I connect dots. Building something new ✨/Ø. Past: @kernel0x, @ToucanProtocol, @WEF, @OrdnanceSurvey, @NatlSkiPatrol, @casabonita.
London, England
Joined November 2016
One failure mode is API gatekeeping: brittle terms + policy whiplash that rug-pull competitors. This is where the durability of these architectural decisions is important: if possible, lock it open with technical enforcement; otherwise, regulate.
read.kernel.community
Juan Benet traces the history of the internet and the web, shows us what Web 3 is really about, and reminds us that the term has been around since 2004, when Tim Berners-Lee began work on the...
1
0
1
This AI Frontiers piece on open protocols from Isabel Moure, @timoreilly and @IlanStrauss at @aif_media is a clear articulation of why open, durable, opt-in design matters. They provide a counterweight to the centralizing gravity of unregulated digital platforms.
1
0
1
RT @maceagon: really enjoyed diving into @AstralProtocol with @johnx25bd -- his reflection here about "moving thoughtfully" via @Kernel0x r….
0
2
0
The internet can be an alienating place — Kernel proves that it can also be a place of connection and community. More than just "crypto", Kernel is a place for anyone thinking deeply about how to build technology that helps us live well. If you have questions, I'm available.
𝕂𝔹𝟙𝟙 𝐢𝐬 𝐡𝐞𝐫𝐞. 𝐀𝐩𝐩𝐥𝐲 𝐛𝐲 𝐀𝐮𝐠 𝟏𝟓. ꜰᴏʀ ~50 ᴛᴇᴄʜɴᴏʟᴏɢɪꜱᴛꜱ ʙᴜɪʟᴅɪɴɢ ɴᴏᴠᴇʟ ɪɴꜰʀᴀꜱᴛʀᴜᴄᴛᴜʀᴇ, ɪɴᴛᴇʀꜰᴀᴄᴇꜱ, & ɪɴᴛᴇʟʟɪɢᴇɴᴄᴇ (ɪɴ ᴄʀʏᴘᴛᴏ + ʙᴇʏᴏɴᴅ) . 𝚆𝚑𝚊𝚝 𝚒𝚜 𝚝𝚑𝚎 𝚔𝚎𝚛𝚗𝚎𝚕 𝚘𝚏 𝚢𝚘𝚞𝚛 𝚒𝚍𝚎𝚊?
0
1
7
@TaylorOshan 10/. If any of this resonates — if you're working with location data and need it to mean something — I’d love to hear from you. We’re still shaping the future of this space, and looking for thoughtful collaborators across domains. 🧭.
1
0
2
@TaylorOshan 9/. Next up is a focused period of customer discovery and validation. We want to learn:. – Where does this approach stand up?.– Where does it fall down?.– Who actually needs this?.– What would make it easy to adopt?.
1
0
1
@TaylorOshan 8/. We’re excited to apply this in domains where credible location evidence really matters: insurance, logistics, identity, content licensing, public safety. When location is tied to money, compliance, or reputation, weak evidence creates real risk.
1
0
1
@TaylorOshan 7/. We’re developing a system that takes raw location evidence — GPS, networks, sensors — and turns it into cryptographically signed location proofs. Each proof is a verifiable digital record of where and when something happened, scored based on the signals it draws from.
1
0
1
@TaylorOshan 6/. One simple insight: stacking multiple independent signals produces stronger location proofs. It’s like multi-factor authentication, but for place. GPS alone can be spoofed. So can Wi-Fi or IP. But when multiple signals line up, it gets much harder to fake.
1
0
2
@TaylorOshan 5/. We’ve been building a framework to make sense of these systems — evaluating them by precision, cost, privacy, trust model, threat resistance, and more. The goal is to make their trade-offs clear, and help people identify the right approach for their needs.
1
0
1
@TaylorOshan 4/. There are many different types of PoL systems. They rely on different sources: GPS, Bluetooth, Wi-Fi, device sensors, secure elements, social witnesses, legal contracts and more. Each has strengths and weaknesses. No single approach works everywhere.
1
0
1
3/. For the past year I’ve been working with Prof. @TaylorOshan at UMD, studying proof-of-location (PoL) systems. At their core, PoL systems produce evidence that a location claim is true — evidence that would require technical manipulation, collusion, or fraud to forge.
1
0
1