Security

The complete guide to Bitcoin and altcoin hacks by Gal Crypto
Perhaps you'd be surprised to find out that Bitcoin has been hacked in the past? Millions of fake Bitcoins were minted out of thin air and injected into the blockchain. Even the...
Is it safe to use cryptocurrencies using WiFi? by Gal Crypto
Yes, it is perfectly fine to use cryptocurrencies using WiFi. But, as with everything related to cryptocurrencies, some precautions must be taken, especially when using public and ...
The year of the Proof of Work genocide? by @Cryptobill
Last week the Ethereum Classic team was caught off guard. On January 6, reports of double spends and blockchain anomalies began to pour in just as ETC was celebrating the earlie...
ELI5 Is Coinbase safe? by @Cryptobill
There's an old saying by cryptocurrency experts that goes a little like this: "if you don't control your private key, then you don't really own cryptocurrency." This is technica...
Novam Token : Intelligent proactive security by @Cryptobill
NOVAM protects endpoints and networks by monitoring and mitigating threats automatically on global Internet of Things (IoT) devices. We also offer security teams and corporate risk...
ELI5 Ledger Nano by @Cryptobill
Ledger Nano is a family hardware wallets that earned their fame for being reliable, sturdy and affordable. Ledger's also were some of the very first hardware solutions for secure c...
How do I safely store Bitcoin? by @Cryptobill
Bitcoin security boils down to a few good practices which you should be aware of : Your private key is the single most important digital asset. With it all your addresses can ...
Brazil’s largest Bitcoin exchange has been down for 72 hours. R$ 1 million in duplicate transactions being investigated by @Cryptobill
Brazil's largest Bitcoin exchange, Foxbit, is down for maintenance as R$ 1 million (~ U$ 300,000) have apparently gone missing. In a live feed broadcast earlier today, Foxbit ha...
Net Neutrality: The next battle against Bitcoin? by @Cryptobill
Bitcoin has withstood the largest and most technically sophisticated attacks likely ever perpetrated against any known technology. Billionaires who control large scale mining opera...
What’s a “paper wallet”? Doesn’t sound too high tech? by @Cryptobill
Five steps to make paper in ancient China Printing secrets on paper doesn't sound high tech, but it's one ...