A Practical guide to Mining and Transferring Tokens of Your Own Private Cryptocurrency “Which cryptocurrency is better? Mine, of course! Please don’t make me sign up to another service, just let me trade Ether and create Tokens …” Like many...
If you’ve been around the blog for a while, you know that I’m a big fan of the use of encryption for the sake of privacy. I’ve ranted about PGP and S/MIME, tried to break steganography and complained about the privacy issues I face as a Gmail user. ...
In my quest for more knowledge of cryptography, I’ve started reading actual books (instead of just reading API reference documents.) If you’re like me, and you’ve decided that going deeper than just making the code work is a good thing, read on. Today, I’m going to...
In the late 1990’s, I was working on a paper in a computer ethics class on one of the hot topics of the day which was the implementation of Carnivore (later Digital Collection System 1000 or simply, DCS1000) by the FBI. Basically, these were strategically placed...
Terrible mashup of OpenPGP.js logo and source code by the author (because nothing says “Where’s the source?” like a bad logo.) Last time I wrote, I showed you how to use Braintree.js to encrypt form values. I even built a contact form to do it. It occurred to me that...