Security

21 Million is Non-Negotiable

“Distorting supply only serves to distort a currency’s ability to perform its job of storing and communicating value; it can’t make a currency more valuable or secure.” – Phil Geiger

Read More

ION Beta Launches on Bitcoin Mainnet

“ION will decentralize the way that messages and application data is encrypted and exchanged.” – ION Announcement

Read More

Bitcoin & The Layers of Financial Cryptography

A follow-up to yesterday’s incredible read from The Nakamoto Institute by Ian Grigg, The 7 Layers of Financial Cryptography. Today we dig into what the reality of financial cryptographic systems as they have been developed & secured through Bitcoin.  What philosophy and mentality informed it all, and where did it differ from Ian’s vision, and where was he able to see what would come about?

Read More

EARN IT Attacks Online Security & Privacy

“Make no mistake: the EARN IT Act is a vehicle to undermine end-to-end encryption.” – Elliot Harmon

Read More

The Rise of SIM Swapping

“For the better part of the last decade, the combination of these two practices has given rise to an increasing number of SIM swap attacks ending in the theft of bitcoin and other cryptocurrencies.” – David Hollerith

Read More

Proof-of-Work, The Fundamental Laws of Physics & Nature

“It is therefore a universal truth that all work has a measurable cost of energy transformation due to the very nature of the universe, and the laws of thermodynamics. It is with these laws that we underpin Bitcoin’s Proof-of-Work.” – Rory Highside

Read More

️Who Secures Bitcoin?

Is it the miners? The developers? The nodes? Who really defines Bitcoin, who establishes the rules that make it immutable, secures it against unwanted change, and determines the protocol that distinguish a random integer, from a true Bitcoin integer?

Read More

Addressing Security Concerns with the Casa Node

Recently, a bit of Twitter drama has arisen from a post that started with @JWWeatherman’s disclosure of a perceived critical bug in the Casa Node device. Today, to start off a discussion of home network security, what self-signed certificates do/don’t guarantee, and the general trade-offs between security and usability, we read @CasaHODL’s blog post responding to JW’s concerns, and then we get Guy’s take on this as a Casa Node user.

Read More

Szabos Confidential Auditing

“Auditing controls might fairly be called the security protocols of capitalism… [but] auditing is in deep conflict with efforts towards greater privacy.” –Nick Szabo

Read More

Custody in the Age of Digital Assets

“What we’re witnessing with digital assets is a move back toward bearer assets — now that users of these protocols have figured out how to trade them quickly, digitally, and without any possibility for the types of errors that lead to costly reconciliation processes.” – Fidelity Digital Assets

Read More