Latest

Mar
30
Announcing the Bitcoin Core Config Generator

Announcing the Bitcoin Core Config Generator

Bitcoin Core is a complex piece of software. Because one of the primary goals of Bitcoin is to enable users to be self sovereign and have…
2 min read
Mar
11
Nobody Understands Bitcoin (And That’s OK)

Nobody Understands Bitcoin (And That’s OK)

No one has found the bottom of the Bitcoin rabbit hole.
12 min read
Feb
13

Moderation Methods vs Censorship Claims

One of the major points of contention in the Bitcoin community these days revolves around claims of censorship on popular Bitcoin forums…
7 min read
Jan
30

Statoshi’s Satoshi Roundtable Review

I was fortunate to attend the 2017 Satoshi Roundtable on behalf of BitGo. It was truly a pleasure to meet many of the people with whom I…
8 min read
Jan
28
Ledger Blue Review

Ledger Blue Review

Jameson reviews the setup and usage of Ledger's latest hardware wallet.
9 min read
Jan
20

SegWit: The Swiftest Safe Path Forward

I and many of my colleagues at BitGo and across the Bitcoin ecosystem are eager to see Segregated Witness activated.
2 min read
Jan
09

Bitcoin: 2016 in Review

In addition to my day job as a BitGo engineer, I run Statoshi.info, a site I created in 2014 to track Bitcoin metrics from the perspective…
5 min read
Nov
13
Bitcoin’s Security Model: A Deep Dive

Bitcoin’s Security Model: A Deep Dive

When discussing consensus mechanisms for different cryptocurrencies, one issue that often causes arguments is a lack of understanding of the security model that they provide for the historical data in the ledger.
15 min read
Aug
19
How to Run Bitcoin as a Tor Hidden Service on Ubuntu

How to Run Bitcoin as a Tor Hidden Service on Ubuntu

How and why Bitcoin node operators should run their node on the Tor network.
4 min read
Jul
23
Bitcoin: The Trust Anchor in a Sea of Blockchains

Bitcoin: The Trust Anchor in a Sea of Blockchains

Bitcoin is the strongest permissionless blockchain in terms of computational security because it has the most resources being expended in order to secure it via a process known as proof of work.
17 min read