Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

Base64 is one of the most popular encoding formats for representing data. Have some binary data? Base64 encodes it for convenient readability and parsing. Base58 is just another encoding format (with 58 characters instead of 64, and has gained popularity largely due to Bitcoin and other cryptocurrencies. Also, if you came here confused, encryption and …

Read more

Basic Intro to Elliptic Curve Cryptography

Elliptic curve blog post min

Elliptic Curve Cryptography is a modern public-key encryption technique based on mathematical elliptic curves that is known for producing smaller, faster, and more efficient cryptographic keys. Bitcoin, for example, uses ECC as an asymmetric cryptosystem because it is so lightweight. In this introduction to ECC, I want to focus on the main ideas that make …

Read more

Achieving Data Integrity Using Cryptography

photo 1542185400 f1c993ecbea2

Data integrity refers to the accuracy, legitimacy, and consistency of information in a system. When a message is sent, particularly using an untrusted medium, data integrity provides us confidence that the message wasn’t tampered with. For example, the SSL signature of Qvault provides confidence that the webpage and data coming from our servers are really …

Read more

Top 8 Online Crypto Communities 2021

people at a concert scaled

Crypto has been explosive in 2020, and while the hype train has somewhat left the station, we are sure it will be back. In the meantime, it’s a good opportunity to learn more about the technology that supports decentralized money. These communities can help tremendously. #1 BITCOINTALK Bitcointalk is undoubtedly the gold standard for the …

Read more

(Very) Basic Intro to Hash Functions (SHA-256, MD5, etc)

Hash functions are used to securely store passwords, find duplicate records, quickly store and retrieve data, among other useful computational tasks. As a practical example, all user passwords on Qvault are hashed using Bcrypt to ensure that if an attacker were ever to gain access to our database our user’s passwords wouldn’t be compromised. I …

Read more

How to Secure Your Bitcoin

photo 1523348837708 15d4a09cfac2

If you’re new to Bitcoin and cryptocurrency, you may have heard the common phrase not your keys not your coins. While self-custody isn’t for everyone, its the only way to truly have exclusive control over your funds. If that’s what you’re into, read on. Dangers of storing your own Bitcoin In order to spend your …

Read more

BIP 32 Watch-Only Wallets

https://dissolve.com/video/Key-ring-frozen-ice-royalty-free-stock-video-footage/001-D617-9-730

Bitcoin improvement proposal 32 is, in my opinion, one of the most important BIPs we have. (Thanks Peter Wuille!) BIP 32 gave us Hierarchical Deterministic Wallets. That is, the ability to create a tree of keys from a single seed. In the early days of Bitcoin, each time a user wanted to receive new coins, …

Read more

Trustworthy vs Trustless Apps

https://whyy.org/episodes/in-science-we-trust/

In the wake of the hearings about Facebook’s new Libra blockchain, it is more important than ever that we all understand the difference between trustworthy and trustless apps. A trustworthy app is an app whose developers are known and trusted by the community. The developer’s reputations and businesses are on the line, so it motivates …

Read more