Security

Do you really need a hardware wallet?
Carrying a complete banking institution in your pocket is a powerful statement! Hardware wallets are really cool. They're basically specially designed storage systems, like superc...
IOTA hash collisions could have wrecked the network if it were fully decentralized
Professor Matthew Green of Johns Hopkins University posted an interesting, if not troubling, tweet about IOTA's security: The use of a broken hash function would have been a cri...
Is Quantum Key Distribution in the future of cryptocurrencies?
Can you imagine a transmission system where the data would change if anyone simply peeked into it? Imagine the two most popular cryptocurrency enthusiasts, Alice and Bob, could exc...
How MetaMask mistakenly flagged us as a phishing site
We were surprised to find out that since February 10, MetaMask had begun reporting Crypto.BI as a phishing site. At first we thought we'd been hacked, but our techs were unable to ...
Bitcoin Gold replay protection : noise, FUD and one fact.
We'd like to clear up a few misconceptions for those in doubt about what, exactly, the Bitcoing Gold replay protection (or lack thereof) really means. There is no Bitcoin Gold...
How decentralized is Bitcoin? How can Bitcoin be secure if nobody controls it?
Bitcoin's decentralized consensus system is the key to understanding how it can be secure without anyone in particular having to verify every transaction. In the same article, we'v...