Big Brother

They Who Control Encryption

By Lane Wagner Anyone who has seen the movie The Imitation Game, or studied computer science in school, probably has at least a brief understanding of Enigma, Alan Turing, and some of the other fun cryptography that went on during WWII. During this time and until the 1970’s, governments from around the world had near total control of all cryptographic …

https://dissolve.com/video/Key-ring-frozen-ice-royalty-free-stock-video-footage/001-D617-9-730

BIP 32 Watch-Only Wallets

By Lane Wagner Bitcoin improvement proposal 32 is, in my opinion, one of the most important BIPs we have. (Thanks Peter Wuille!) BIP 32 gave us Hierarchical Deterministic Wallets, that is, the ability to create a tree of keys from a single seed. In the early days of Bitcoin, each time a user wanted to receive new coins, their wallet …

https://whyy.org/episodes/in-science-we-trust/

Trustworthy vs Trustless Apps

By Lane Wagner In the wake of the hearings about Facebook’s new Libra blockchain, it is more important than ever that we all understand the difference between trustworthy and trustless apps. A trustworthy app is an app whose developers are known and trusted by the community. The developer’s reputations and businesses are on the line, so they are motivated to …

Snyk Security Review

By Lane Wagner We recently integrated Snyk into Qvault as a way to get more visibility into known vulnerabilities in Qvault’s code base. Snyk has already patched a critical vulnerability in lodash for us, which allowed us to continue releasing new versions before the official fix for lodash was published a few days ago. We can’t speak to whether Snyk …

https://www.scienceandtechnologyresearchnews.com/the-race-to-build-a-quantum-computer/

Is AES-256 Quantum Resistant?

By Lane Wagner With quantum computers getting more powerful every year, many worry about the safety of modern encryption standards. As quantum computers improve in performance and the number of qubits used for calculations increase, current crypto systems are under more threat of attack. What will break? Many asymmetric encryption algorithms have been mathematically proven to be broken by quantum …

Qvault Logo

Intro to Qvault

Qvault is a new opensource password manager, with an emphasis on user experience and customization options. Many who stumble upon Qvault ask, “How is this different from other password managers?” In this article we explain what sets Qvault apart. 1. Open Source Many password managers that exist today do not publish their code for the public to review and collaborate …

http://thehobbyts.com/fun-dice-games-ultimate-list/

Randomness and Entropy in Node and Electron

Randomness is a hard problem for computers. For this reason most functions that generate randomness are not considered cryptographically secure. That means that it is possible that an attacker can take a good guess at what number a non-secure randomness generator generated. How can randomness be attacked? Many non-secure randomness (or entropy) generators would do something similar to the following: …