There's not, but it's also a very very old technology - definitely not 'modern' linux.
It has a lot of problems especially with protocol standartization and permissions. You can tell something and you might get something back or you might listen for something and get garbage instead.
Well, yes, if they use something completely different to what's published and designed.
But no, we're not talking about the case where there's no trust at all in the government, because then you don't get verifiable credentials at all. We're talking about building privacy-preserving credentials that actually have a use.
That blog post is very light on details can be condensed to a single line/paragraph. LSM trees are more efficient for SSDs and modern databases use them.
I don't know enough to comment yet but will go read about it.
reply