security

Jul
17
How to Securely Create a Bitcoin Seed Phrase in 9 Simple Steps

How to Securely Create a Bitcoin Seed Phrase in 9 Simple Steps

A user-friendly guide for how to generate seed phrases from your own entropy.
2 min read
Feb
18
How Many Bitcoin Confirmations is Enough?

How Many Bitcoin Confirmations is Enough?

How safe is it to accept a bitcoin transaction after X confirmations? A deep dive into the math behind quantifying double-spend risk.
5 min read
Aug
03
Crypto's Kryptonite: Complexity

Crypto's Kryptonite: Complexity

Thoughts on navigating the wider crypto ecosystem and evaluating risks of new projects.
5 min read
Aug
09
Are Chinese Miners a Threat to Bitcoin?

Are Chinese Miners a Threat to Bitcoin?

Is the concentration of hashpower within the borders of China a cause for concern about a nation state attack against the network?
6 min read
Feb
12
Firearms for Home Defense

Firearms for Home Defense

Considerations to take regarding firearm selection, training, and storage for home defense.
8 min read
Jan
21
How to Securely Back Up Data to Cloud Storage

How to Securely Back Up Data to Cloud Storage

Jameson researches user-friendly solutions for backing up sensitive data to cloud providers while keeping it safe from third party snooping.
7 min read
Mar
03
Bitcoin Timestamp Security

Bitcoin Timestamp Security

A deep dive into the game theory behind keeping timestamps of bitcoin blocks reasonably accurate.
9 min read
Dec
15
Who Controls Bitcoin Core?

Who Controls Bitcoin Core?

Understanding how the focal point of Bitcoin development operates.
14 min read
Nov
24
Bitcoin Seed Security Analysis

Bitcoin Seed Security Analysis

Exploring the bounds of Seed phrase security.
6 min read
Nov
13
Bitcoin’s Security Model: A Deep Dive

Bitcoin’s Security Model: A Deep Dive

When discussing consensus mechanisms for different cryptocurrencies, one issue that often causes arguments is a lack of understanding of the security model that they provide for the historical data in the ledger.
15 min read