Categorybitcoin

NSA Backdoors and Bitcoin

N

Many cryptographic standards widely used in commercial applications were developed by the U.S. Government’s National Institute of Standards and Technology (NIST). Normally government involvement in developing ciphers for public use would throw up red flags, however all of the algorithms are part of the public domain and have been analyzed and vetted by professional cryptographers who know what...

Satoshi’s Genius: Unexpected Ways In Which Bitcoin Dodged Some Cryptographic Bullets

S

As far as open-source protocols go, one area in which Bitcoin is unique is the sheer difficulty of making any changes to the protocol. Unlike most other protocols, where features can be added, modified or deprecated at a moment’s notice, in the world of Bitcoin even the slightest change requires the simultaneous cooperation of the vast majority of the entire Bitcoin network. The reason for this...

NSA and ECC

N

I’ve been reading up recently on the revelations that the NSA is subverting implementations/service providers to undermine various internet crypto standards (see this: ). Now this has all of the basic hallmarks of a ‘scare campaign’ where people are led to believe that crypto techniques/mathmatics themselves are insecure rather than the truth that the NSA is attacking the...

Not all post 2011 Satoshi appearance has been debunked

N

Such a sensitive topic, so let me note a few things before I start: I will omit the guessing game of what Satoshi’s appearance would or would not matter/mean, what he wants or does not want and just present the hard facts. Not disproved ≠ proved, so do not misunderstand me… oh some of you will, I know you will… The hilarious Satoshi hunts, like the Dorian Nakamoto and Craig Wright sagas are out...

bitcoinj – lightweight simplified payment verification (SPV)

b

bitcoinj is a library for working with the Bitcoin protocol. It can maintain a wallet, send/receive transactions without needing a local copy of Bitcoin Core and has many other advanced features. It’s implemented in Java but can be used from any JVM compatible language: examples in Python and JavaScript are included. It comes with full documentation and many large, well known Bitcoin apps...

Why Johnny can’t encrypt: a usability evaluation of PGP 5.0

W

User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective security requires a different usability standard, and that it will not be achieved through the user...

Bitcoin CIA Presentation

B

Bitcoin
The World’s First
Person-to-Person
digital currency
Presented by Gavin Andresen to the CIA:

World’s richest 0.1% have boosted their wealth by as much as poorest half

W

World’s richest 0.1% have boosted their wealth by as much as poorest half. Inequality report also shows UK’s 50,000 richest people have seen their share of the country’s wealth double since 1984. The richest 0.1% of the world’s population have increased their combined wealth by as much as the poorest 50% – or 3.8 billion people – since 1980, according to a report detailing the widening gap...

Bitcoin is None of the Things it was Supposed to be

B

BITCOIN IS NONE OF THE THINGS IT WAS SUPPOSED TO BE. The cryptocurrency was supposed to replace the finance industry. Instead, it has replicated it. On Thursday, the price of Bitcoin fluctuated by thousands of dollars in a 24-hour period. The Coinbase app — which lets you buy and sell cryptocurrencies, and is the number two free app in the App Store as of this writing — started freezing and...

Social