What’s Up with My Transaction? – Lost Bitcoin Recovery Flow Chart

Remember:* Crypto transactions are irreversible by design. Always double, triple check the receiving address before sending* Be wary of scammers claiming they can recover lost coins. This is often not technically possible as I’ve outlined above, and they will use your information to steal from you. No one doing business through instagram, whatsapp, etc. and

Cryptocurrency Network Forks, Explained

Overview One of the beautiful features of open blockchains is their ability to “fork” in the event of an irreconcilable difference between community members. Many forks have happened in the short history of cryptos – Bitcoin to Bitcoin Cash and Ethereum to Ethereum Classic, to name two major ones. But what actually happens, technically, during

Common Bitcoin & Crypto SCAMS (And How to Avoid Them)

Overview Unfortunately, with all new technology comes those that will take advantage of it in a negative way. The crypto world has brought us some amazing new technology and positive use cases. But it has also brought out those thieves and scammers that will take advantage of others for their own gain. Let’s discuss some

Crypto, Quantum Computing, and You

Overview Many have asked a valid question about Bitcoin and other cryptocurrencies – will they be rendered useless by the advent of quantum computing? Bitcoin is ultimately a software protocol, with several cryptographic algorithms securing it from attackers. But what if attackers can easily break those algorithms once thought to be perfectly secure? Quantum, Cryptography,

Building a Basic Ethereum Smart Contract (For Bike Park Fun)

Overview Ethereum smart contracts offer a wealth of possibilities for building decentralized, blockchain-secured applications. But what is a smart contract? These programs are code executed by the Ethereum Virtual Machine, a decentralized computer on the Ethereum network. Every node on the network receives the contract code, and validates every function call sent through an Ethereum

Digital Personal Security Primer

Overview Computers in all their forms (PC’s, tablets, mobile phones, and more) are an integral parts of our lives – from work, to hobbies, to activism. It is as critical to protect your digital life as it is your own home. With many attackers and attack vectors, there is NO one size fits all security