Loading

Adversarial Pair Programming

Posted by: Poster Image

Summary Argument: In traditional pair programming, two trusted developers are assigned to work jointly on writing sections of software. This article explores an adversarial pair programming concept where two anonymous developers code together under the assumption the other person is malicious.  926 tokens
Agree Disagree
Loading

Celody generates a private key for you to access withdrawn tokens. If you lose this key, you will lose access to your tokens. So keep it safe! Celody does not store these keys.

tokens Generate New Key Use Existing Key
tokens Start Deposit
tokens Start Transfer
Export to AVAX C-Chain Import from AVAX C-Chain

Submit Address

Celody will transfer tokens to address:

tokens Submit Token Amount
Submit Address

Celody will receive your tokens from address:

tokens Submit Token Amount

You have 10 minutes to make ONLY 1 transaction.

10:00

Send CLDY tokens from address (0x000...) to address: 0x0000000000000000000000000000000000000000

After sending, click the "SENT" button below:

Tokens Sent
Admin Review

Enter transaction hash for confirmation:

Back to Menu
Loading Posts...
     In traditional pair programming, two developers are assigned to work jointly on writing sections of software. The use of two people instead of one brings certain benefits. The code gets double-checked for bugs and gains from the expertise of two brains. Of course, there are the added costs of two people instead of one.
     In traditional pair programming, the two developers trust one another. They are known to one another and perhaps even self-select the pair themselves. The trust between the two developers assumes that the code won't be malicious. One developer assumes the other won't insert a backdoor virus. But what if two anonymous developers wanted to code a project without trusting the other?
     If you are paired with another developer who you don't know, like in an open source project that accepts remote commits, you have to assume that all actions could possibly be malicious. Now in a traditional open source project, there isn't really pair programming. It's more of a review system, where individuals develop the code and then authorized users can accept these pieces. But the practice could be extended where two anonymous developers code together and each assumes the other could be malicious.
     One of the mechanisms to ensure that the code is not malicious is to require a token deposit from both people. Such that if a person finds malicious code, the other person could be penalized by having their staked tokens slashed. The actual process could be more sophisticated where the programming pair could have a system of other pairs that review each other, where the incentives to slash increase as more reviewers are added.
     So how could adversarial pair programming be structured? First, everyone in the group would have to agree on the architecture of the code. The entire code base would have to be outlined at a high level and broken into groups. Then those fragmented groups would have to be assigned to random pairs. And then those random pairs would be randomly assigned to have reviewers.

Staked:

Slash Date:

Slash Result:

Staked:

Slash Date:

Slash Result:

Staked: 1490 tokens Verify

Imagining An Age Of Indulgence

The world is slowly rising, with the level of extreme poverty steadily declining. This article argues that the ultimate goal of extreme luxury will bring psychological challenges that match some of the problems of poverty.

Posted by: Poster Image

Read
Staked: 1483 tokens Verify

Coronavirus And Healthcare After Effects

The mortality rate of the coronavirus has tragically been focused on the sickest members of society. This article argues that a perverse consequence of the virus's targeting may be a relatively more prosperous healthcare industry in the future.

Posted by: Poster Image

Read
Staked: 1477 tokens Verify

The Future War of World Currencies

The U.S. dollar has been the world's reserve currency for decades. This article argues that continued printing of U.S. dollars according to Modern Monetary Theory is likely to bring a world war of currencies, with the world's reserve likely ending up being bitcoin or ethereum.

Posted by: Poster Image

Read
Staked: 1476 tokens Verify

The Clone Wars

A new business risk has recently been uncovered: the risk of deplatforming. This article argues that to mitigate this risk a business will have to fully clone the entire business stack - from infrastructure to lawyers to email providers and more.

Posted by: Poster Image

Read
Staked: 1456 tokens Verify

Applying The Teaching Of American Universities...

Most American universities are liberally progressive. This article argues that the structure of American universities themselves are completely unequal, with elite colleges having disproportionately bigger endowments and resources. Universities that believe in equality of outcome should rebalance universities themselves.

Posted by: Poster Image

Read
Staked: 1432 tokens Verify

The Hidden Benefits Of Iframe Based Development

Iframe based web development as a software practice hasn't sufficiently been analyzed. This article argues that iframes allow single page apps to isolate security, improve performance, and increase developer speed through modular operations.

Posted by: Poster Image

Read
Staked: 1335 tokens Verify

Progressive Tax Analogs

There is a large segment of society that champions progressive tax systems to reduce inequality. This article argues that there is not a similarly sized segment that champions other progressive systems to reduce inequality in other areas of society. Why not?

Posted by: Poster Image

Read
Staked: 1151 tokens Verify

Thinking From Second Principles

There's a current fashion to approach problems from first principles in order to come up with fresh solutions. This article argues that thinking from second principles provides a quicker solution path while still yielding novelty.

Posted by: Poster Image

Read
Staked: 4.425 tokens Verify

30 Minute HIIT Cardio

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.3 tokens Verify

Elon Musk Interview

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.01 tokens Verify

Glenn Greenwald on Censorship

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.972 tokens Verify

2020 Reflections on Crypto

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.44 tokens Verify

WWSD Podcast

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.4 tokens Verify

Joe Rogan Experience With Tulsi Gabbard

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.38 tokens Verify

Operation Fireball 2.0

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.152 tokens Verify

V Is For Vaccine

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.588 tokens Verify

Wow, No Thank You

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.467 tokens Verify

Why Fish Don't Exist

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.33 tokens Verify

Javascript the Good Parts

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.318 tokens Verify

Bitcoin Billionaires

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.99 tokens Verify

Calling My Phone

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.87 tokens Verify

Limit

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.64 tokens Verify

Arcade

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.467 tokens Verify

Crave You

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Voting In Process