• Home
  • About
    • Kyle Den Hartog photo

      Kyle Den Hartog

      Hacker. Golfer. Futurist. Skier. Developer.

    • Learn More
    • Email
    • Twitter
    • LinkedIn
    • Github
    • StackOverflow
  • Thoughts
    • All Posts
  • Projects
  • Resume

My Thoughts

  • On Cypherpunk Agency

    Level up Milady. We're playing chess not checkers these days.

    Read More
  • Loss Leader Software

    A Loss Leader Software is software that is free to attract a user so that you can nudge the user towards another product or service you generate revenue on to continue to fund the development of both

    Read More
  • Framework for Applying Gardner's Theory of Multiple Intelligences

    Think of intelligence as knowledge that compounds over time.

    Read More
  • Future-Proofing DeFi: How Prediction Markets Can Insure User Funds

    a novel approach to DeFi risk management, leveraging prediction markets to dynamically hedge against hacks, smart contract failures, and other threats, enhancing protocol security and user trust.

    Read More
  • Breaking the Left-Right Binary: How Multivariate Political Mapping Can Help Us Redesign Online Debate

    The problem with politics is that it is a multivariate by design. Put another way, the number of problems that any group of people can care about at one time is infinite and relative. So we need a new way to model it.

    Read More
  • Decentralizing Age Verification with SSI: Separating Content Moderation from Guardianship

    Age verification laws are coupling content moderation with guardianship problems, reducing user agency because of our centralized trust architectures. By separating these concerns and leveraging client-side filtering technologies, we can create more private and decentralized solutions for protecting children online without compromising everyone's Web experience.

    Read More
  • How SSI Becomes a Centralized Tool For Gatekeeping

    Self Sovereign Identity subtly introduces centralization through its chosen trust architecture. We've re-created a structure where institutional claims about subjects are more trusted which recreates the same gatekeeping mechanisms SSI was meant to eliminate.

    Read More
  • From Printing Press to Digital Identity: A Pattern of Moral Crisis

    This isn't a new problem in decentralized identity - it's been ongoing for centuries, dating back to the printing press. We keep inverting solutions and repeating historical patterns.

    Read More
  • Why crypto: An explanation for Improving Transactions On the Web

    Fundamentally transacting on the web is limited by credit card payment systems today

    Read More
  • Web3 is Reintroducing Cross-Origin Tracking Accidentally

    We should expect that when the user shares their address that will act as implied consent for cross-origin tracking in the same way cookie notices act as a prompt for tracking.

    Read More
  • We Shape Our Tools then Our Tools Shape Us

    the methods we choose to communicate with affects not only the cohesiveness of the community, but also the norms and the values reflected.

    Read More
  • Pseudonymity on the Web is Dying

    Read More
  • A response to Identity Woman's recent blog post about Anoncreds

    Kaliya has done a great job of honestly and fairly distilling a nuanced technical discussion about the Hyperledger SSI stack

    Read More
  • Convergent Wisdom

    Convergent Wisdom is utilizing the knowledge gained from studying multiple solutions that approach a similar outcome in different ways in order to choose the appropriate solution for the problem at hand.

    Read More
  • Financing Open Source Software Development with DAO Governance Tokens

    Is it possible to fix the tragedy of the commons problem with a DAO Governance Token?

    Read More
  • My Take on the Misframing of the Authentication Problem

    First off, the user experience of authenticating on the web has to be joyful first and foremost. Secondly, I think it's important that we recognize that the security of any authentication system is probabilistic, not deterministic.

    Read More
  • Comparing VCs to ZCAP-LD

    Verifiable Credentials are well suited for provenanced statements. ZCAP-LD is great for distributed authorization systems.

    Read More
  • Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs

    I'll cover an example design which relies upon verifiable credentials for an authorization system and the tradeoffs faced.

    Read More
  • Common Delegation Patterns in the Verifiable Credential Ecosystem

    Here's 3 ways you can utilize VCs and DIDs to enable delegation and attenuated delegation for more complex scenarios.

    Read More
  • Theory of Making a Private Internet

    Privacy is made possible when all actions appear to be random.

    Read More
  • Why I Decided to Remove Google Analytics from my Blog

    I want to see a world where people can use technology privately each and everyday

    Read More
  • Tech isn't a Tool to Impose Values

    Technologies should adapt to the people rather than users adapting to their technologies.

    Read More
  • A thought experiment on free will

    An experiment on testing free will

    Read More
  • The Case for Off-Chain Data Storage

    Lets use blockchain smart contracts to act as a trusted database administrator and log management system.

    Read More
  • Quantifying Trust: Is it possible?

    If we can build a system that has guarantees of identity verifiability and immutability than how do we quantify trust?

    Read More
  • ID2020-Summit-Review

    it's important that organizations like ID2020 host these events to bring key stakeholders together to share experiences and form coalitions

    Read More
  • Cryptonomics Equilibrium

    Economic equilibrium means that cryptocurrency has tangible value to all involved parties therefore increasing the demand and flow of the tokens.

    Read More
  • Personal Privacy in the Wake of Reoccurring Data Breaches

    It seems like every other week there is a new data breach in the news.

    Read More