Base64 vs Base58 Encoding

Base64 vs Base58 Encoding

Base64 is one of the most popular encoding formats for representing data. Have some binary data? Base64 encodes it for convenient readability and parsing. Base58 is just another encoding format (with 58 characters instead of 64, and has gained popularity largely due to Bitcoin and other cryptocurrencies. Also, if you came here confused, encryption and … Read more

(Very) Basic Intro To Elliptic Curve Cryptography

Basic Intro to Elliptic Curve Cryptography

Elliptic curve cryptography is a modern public-key encryption technique based on mathematical elliptic curves. Elliptic curve crypto often creates smaller, faster, and more efficient cryptographic keys. In this introduction, our goal will be to focus on the high-level principles of what makes ECC work. For the purposes of keeping this article easy to digest, we’ll omit implementation … Read more

Achieving Data Integrity Using Cryptography

photo 1542185400 f1c993ecbea2

Data integrity refers to the accuracy, legitimacy, and consistency of information in a system. When a message is sent, particularly using an untrusted medium, data integrity provides us confidence that the message wasn’t tampered with. For example, the SSL signature of Qvault provides confidence that the webpage and data coming from our servers are really … Read more

Top 8 Online Crypto Communities 2020

5a521fa72f93c7a8d5137fcf

Crypto is still rapidly growing in 2020, and while the hype train has somewhat left the station, we are sure it will be back. In the meantime, it’s a good opportunity to learn more about the fundamentals and technology that support decentralized money. These communities can certainly help tremendously. #1 BITCOINTALK Bitcointalk is undoubtedly the … Read more

(Very) Basic Intro to Hash Functions (SHA-256, MD5, etc)

Hash functions are used to securely store passwords, find duplicate records, quickly store and retrieve data, among other useful computational tasks. As a practical example, all user passwords on Qvault are hashed using Bcrypt to ensure that if an attacker were ever to gain access to our database our user’s passwords wouldn’t be compromised. I … Read more

Cryptology, Cryptography, and Cryptanalysis – Get your Vocabulary Straight!

e2ccd365950e1e853a2c3a4f27d8b92c

Many new developers are jumping right into coding (usually for those fat paychecks) without learning much about the history of Computer Science. People regarded Alan Turing as the father of Computer Science. He was first a cryptologist and mathematician. Then, he pioneered the field of CS in order to solve cryptological problems. In this article, … Read more

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

photo 1550565227 a6144af19c78

DEPRECATED NOTICE This article will remain live for historic purposes, but the Qvault password manager is a deprecated project. Qvault and Samourai’s Sentinel are a match made in heaven for anyone wanting a secure and easy solution for Bitcoin savings. Why? A watch-only wallet is perfect for users who want a high-security savings account. It … Read more

How to Securely Backup a Seed Phrase

photo 1523348837708 15d4a09cfac2

Many newcomers to the Bitcoin and cryptocurrency space seem interested in holding their own private keys. As we know, not your keys not your coins. Dangers In order to spend Bitcoins, a user must have access to their wallet or to the seed phrase that was created alongside the wallet. Likewise, an attacker only needs … Read more

You Can’t Function in 2019 Without a Password Manager

Password Feature art

Secrets. You certainly have many and I don’t mean stretching the truth to a first date about interests and hobbies or being into My Little Pony as a forty-year-old man. I’m talking about digital secrets. Social security numbers, passwords, pin codes, cryptocurrency keys, credit cards, and bank account numbers, for instance, define our online personas … Read more