Achieving Data Integrity Using Cryptography

Data integrity refers to the accuracy, legitimacy, and consistency of information in a system. When a message is sent, particularly using an untrusted medium, data integrity provides us confidence that the message wasn’t tampered with. What Are Potential Causes of Illegitimate Data? Data integrity provides protection from a wide range of problems which involve data … Read more Achieving Data Integrity Using Cryptography

Base64 vs Base58 Encoding

By Lane Wagner – @wagslane on Twitter Base64 is one of the most popular encoding formats for representing data. Have some binary data? Base64 encodes it for convenient readability and parsing. Base58 is just another encoding format (with 58 characters instead of 64, and has gained popularity largely due to Bitcoin and other cryptocurrencies. When it comes … Read more Base64 vs Base58 Encoding

Top 10 Online Crypto Communities 2020

Crypto is still rapidly growing in 2020, and while the hype train has somewhat left the station, we are sure it will be back. In the meantime, it’s a good opportunity to learn more about the fundamentals and technology that support decentralized money. These communities can certainly help tremendously. #1 BITCOINTALK https://bitcointalk.org/ Bitcointalk is undoubtedly … Read more Top 10 Online Crypto Communities 2020

(Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

This is going to be a basic introduction to hash functions. I will assume most of my audience is here to gain an understanding of why hash functions are used and the basic idea of why they work. My goal is to explain it in a general sense, I will be omitting proofs and implementation … Read more (Very) Basic Intro to Hash Functions (SHA-256, MD-5, etc)

(Very) Basic Intro To Elliptic Curve Cryptography

Updated – May 31, 2020 This is going to be a basic introduction to elliptic curve cryptography. I will assume most of my audience is here to gain an understanding of why ECC is an effective cryptographic tool and the basics of why it works. My goal is to explain it in a general sense, … Read more (Very) Basic Intro To Elliptic Curve Cryptography

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

Many new developers are jumping right into coding (usually for those fat paychecks) without learning much about the history of Computer Science. People regarded Alan Turing as the father of Computer Science. He was first a cryptologist and mathematician. Then, he pioneered the field of CS in order to solve cryptological problems. In this article, … Read more Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

DEPRECATED NOTICE This article will remain live for historic purposes, but the Qvault password manager is a deprecated project. Qvault and Samourai’s Sentinel are a match made in heaven for anyone wanting a secure and easy solution for Bitcoin savings. Why? A watch-only wallet is perfect for users who want a high-security savings account. It … Read more How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

Bitcoin Doesn’t Care About Your Identity, Only Your Knowledge

When you make a withdrawal at a bank, pay taxes, or get a license you must prove who you are. The process of proving who you are is a very “human” process. The authority checks your ID and ensures the picture looks like you, which allows them to trust that you are the person who’s … Read more Bitcoin Doesn’t Care About Your Identity, Only Your Knowledge

How to Securely Backup a Seed Phrase

Many newcomers to the Bitcoin and cryptocurrency space seem interested in holding their own private keys. As we know, not your keys not your coins. Dangers In order to spend Bitcoins, a user must have access to their wallet or to the seed phrase that was created alongside the wallet. Likewise, an attacker only needs … Read more How to Securely Backup a Seed Phrase

You can’t function in 2019 without a password manager

Secrets. You certainly have many and I don’t mean stretching the truth to a first date about interests and hobbies or being into My Little Pony as a forty-year-old man. I’m talking about digital secrets. Social security numbers, passwords, pin codes, cryptocurrency keys, credit cards, and bank account numbers, for instance, define our online personas … Read more You can’t function in 2019 without a password manager