Technical

Fetching Live Balances on a Microntroller with WatchAddr (Code Companion #3)

Describing my WatchAddr project that fetches live balances on an ESP8266 microntroller and some of the development challenges I faced.

Read the article here


Learn Hashing, Binary, and Proof-of-Work with MicroProver (Code Companion #2)


A code companion for MicroProver, a proof-of-work visualization tool that helps newcomers understand this critical blockchain security topic.

Read the article here


Offline Address Generation with uBitAddr (Code Companion #1)


A Code Companion for my offline address generator, uBitAddr designed to run on the Adafruit M4 line of microprocessors.

Read the article here


Token-Ize Me – The Basics of ERC20 Tokens


An overview of how ERC20 standard token smart contracts are developed and interacted with.

Read the article here


Super Segwit Scripts


Segwit is the new hotness in Bitcoin and Litecoin. Learn about segwit validation scripts are similar and different from traditional transactions.

Read the article here


Inside Ethereum Transactions


Learn about how the Ethereum model differs from Bitcoin and what data is included in transactions.

Read the article here


PyCon 2019 Lightning Talk BIP39 Mnemonics

A lightning talk (5 mins or less) on how to generate a BIP39 mnemonic seed in Python

View the slides here

Wrong Address Woes – What Happens if You Send BCH to a BTC address (and vice versa)

Understanding what happens if you accidentally send BCH to a BTC address or vice versa by understanding private keys and addresses. Solutions and pitfalls are addressed as well.

Read the article here


(Bitcoin) Script Kiddies – Understanding Basic Transaction Scripts

A technical look at home Bitcoin transaction scripts work, with a walkthrough of the most common Pay to Public Key Hash script type.

Read the article here


EZ-Pay – Full Node vs. SPV Wallets

A technical overview of the differences between full node and SPV (simplified payment verification) wallets – how they verify funds and security/privacy concerns

Read the article here


Playing With Blocks: The Basics of Blockchain Databases (Part 2 – Blockchain for Techies)

A technical look at how blockchains are secured using proof of work and cryptographic hash “chaining”.

Read the article here


BIP39 Mnemonics Made Easy (Part 2 – The Tech of Bits to Backups)

An in-depth look at how mnemonic backups are generated for crypto wallets using the BIP39 protocol.

NOTE: a few times I said 248 when I meant 2048, and some binary numbers are mis-written on the board. My apologies! The article and slides are correct AFAIK.

Read the article here


Proof of Work, Explained (Part 2 – A Hash Bash for Techies)

A technical look at proof of work algorithms used in applications such as Bitcoin and Bitcoin Cash.

Read the article here