Dissecting Bitcoin, Part 2 — Challenges
In the previous part, we discussed the core technology behind Bitcoin and the concepts that make it tick, namely:
In the previous part, we discussed the core technology behind Bitcoin and the concepts that make it tick, namely:
Recently, I decided to pull up Satoshi Nakamoto’s paper with the hope of getting a deeper appreciation for Bitcoin and the machinations of…
Key signing is a hallowed tradition in the open source world with a very specific protocol for validating and confirming an identity before accepting someone to the web of trust. It’s almost never done without meeting the person being admitted into the trust relationship and it goes like this:
I’m sure most of you would have had to mess around with VPNs at some point of your lives. Sometimes, VPNs can turn nasty and bind you to an OS that hinders your free spirit. But thanks to IPSec, that doesn’t always have to be the case. For
Came across the M4 project a couple of days ago while doing some much needed digging. Its simply a distributed effort to crack 3 enigma messages encoded in (what is believed to be) “Shark”, the formidable naval cipher which uses four rotors as opposed to “Dolphin” that uses just three.
I recently tried out TOR for the first time as this has been something in my TODO list for a while. It was just a matter of apt-get install tor privoxy Adding the following line in /etc/privoxy/config forward-socks4a / localhost:9050 . And starting the tor and privoxy services. Next,