Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

Base64 is one of the most popular encoding formats for representing data. Have some binary data? Base64 encodes it for convenient readability and parsing. Base58 is just another encoding format (with 58 characters instead of 64, and has gained popularity largely due to Bitcoin and other cryptocurrencies. Also, if you came here confused, encryption and … Read more

(Very) Basic Intro To Elliptic Curve Cryptography

Basic Intro to Elliptic Curve Cryptography

Elliptic curve cryptography is a modern public-key encryption technique based on mathematical elliptic curves. Elliptic curve crypto often creates smaller, faster, and more efficient cryptographic keys. In this introduction, our goal will be to focus on the high-level principles of what makes ECC work. For the purposes of keeping this article easy to digest, we’ll omit implementation … Read more

Shamir’s Secret Sharing Step-By-Step

Shamir's Secret Sharing Step By Step Library

Adi Shamir’s Secret Sharing is a cryptographic algorithm that allows distinct parties to jointly share ownership of a single secret by holding shares. The original secret can only be reconstructed by using a minimum number of shares, which allows different parties to cooperate without the need to fully trust one another. Example Problem To illustrate, … Read more

Achieving Data Integrity Using Cryptography

photo 1542185400 f1c993ecbea2

Data integrity refers to the accuracy, legitimacy, and consistency of information in a system. When a message is sent, particularly using an untrusted medium, data integrity provides us confidence that the message wasn’t tampered with. For example, the SSL signature of Qvault provides confidence that the webpage and data coming from our servers are really … Read more

Top 8 Online Crypto Communities 2020


Crypto is still rapidly growing in 2020, and while the hype train has somewhat left the station, we are sure it will be back. In the meantime, it’s a good opportunity to learn more about the fundamentals and technology that support decentralized money. These communities can certainly help tremendously. #1 BITCOINTALK Bitcointalk is undoubtedly the … Read more

(Very) Basic Intro to Hash Functions (SHA-256, MD5, etc)

Hash functions are used to securely store passwords, find duplicate records, quickly store and retrieve data, among other useful computational tasks. As a practical example, all user passwords on Qvault are hashed using Bcrypt to ensure that if an attacker were ever to gain access to our database our user’s passwords wouldn’t be compromised. I … Read more

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

photo 1550565227 a6144af19c78

DEPRECATED NOTICE This article will remain live for historic purposes, but the Qvault password manager is a deprecated project. Qvault and Samourai’s Sentinel are a match made in heaven for anyone wanting a secure and easy solution for Bitcoin savings. Why? A watch-only wallet is perfect for users who want a high-security savings account. It … Read more

How to Securely Backup a Seed Phrase

photo 1523348837708 15d4a09cfac2

Many newcomers to the Bitcoin and cryptocurrency space seem interested in holding their own private keys. As we know, not your keys not your coins. Dangers In order to spend Bitcoins, a user must have access to their wallet or to the seed phrase that was created alongside the wallet. Likewise, an attacker only needs … Read more