Proving ownership of a Bitcoin (BTC) address is a crucial aspect in various scenarios, such as verifying identity in a transaction or demonstrating holdings without revealing private keys. This guide explores how to prove ownership for different BTC address types, including algorithm specifications and step-by-step methods. BTC Address Types P2PKH (Pay-to-Public-Key-Hash) P2SH (Pay-to-Script-Hash) P2WPKH (Pay-to-Witness-Public-Key-Hash)
Read more
Tag: Privacy
A Comprehensive Guide to PGP: Technical Deep Dive
Posted onPretty Good Privacy (PGP) is a robust encryption program that ensures privacy and authentication for data communication. Developed by Phil Zimmermann in 1991, it’s widely used for securing emails, files, and directories. This article explores the technical details of PGP, including its algorithms, key management, and detailed processes for encryption, decryption, and signing. Cryptographic Foundations
Read more
Sybil Attack 101
Posted onDistributed systems, such as peer-to-peer networks, , and other decentralized platforms, have become increasingly popular due to their potential to offer more robust, scalable, and secure solutions. However, these systems face unique challenges and vulnerabilities, one of which is the Sybil attack. Named after the psychiatric case study “Sybil,” in which a person exhibits multiple
Read more
Cryptocurrency 101
Posted onA cryptocurrency (or Blockchain networks for secure and transparent transactions. Blockchains play a crucial role in maintaining the integrity and immutability of transactional data for cryptocurrencies, making them a reliable and efficient medium of exchange. Decentralized blockchain networks form the backbone of many cryptocurrencies, ensuring a high level of security and preventing fraudulent activities such
Read more
Decentralized Exchanges (DEX) vs. Centralized Exchanges (CEX): A Technical Comparison
Posted onCryptocurrency exchanges have revolutionized the way we trade digital assets, with two main types of exchanges dominating the market: decentralized exchanges (DEX) and centralized exchanges (CEX). In this article, we’ll compare the DEX and CEX from a technical perspective. Decentralized Exchanges (DEX) DEX operate on a decentralized blockchain network, such as Ethereum, and are built
Read more
The Impact of Blockchain and Crypto Technologies on Global Financial Markets
Posted onWelcome to the groundbreaking world of cryptocurrency and blockchain technologies! These cutting-edge technologies are shaking up the global financial environment and paving the path for a more transparent and decentralized future. Consider blockchain technology to be a digital counterpart of a ledger book. It is a secure and immutable digital ledger that records all transactions
Read more
Quick method to sniff the data left on a Linux VM in the public cloud
Posted onVM disks in public cloud may be shared by customers. This is privacy problem. Is there a quick method to sniff the data left on a Linux VM? One possible method: # dd if=/dev/xvda bs=1M | strings -n 100 > strings.txt Using the dd and strings which are pervasive on Linux systems.
How to remove cookies for a certain site in Chrome?
Posted onHow to remove cookies for a specific site/domain in Chrome? I just want to delete the cookies by one site, not the whole cookies stored by my browser. In Chrome’s settings (open chrome://settings/ in the URL bar): Search for “cookie” and you will find “Privacy” -> “Content Settings”. Click the button “Content Settings”. In the
Read more
How to force Chrome on iPhone refresh pages and invalidate the caches
Posted onI find Chrome on my iPhone caches pages/css/js files. That makes browsing faster. However, under some situation, I’d like to force it refresh the pages/css/js and give me the latest one. How to force Chrome on iPhone refresh pages and invalidate the caches? The only method as far as I can find is to clear
Read more
Free VPNs for iPhone Users: OpenVPN + Ovpn Spider
Posted onVPNs are useful for testing viewing webpages from a remote location or visiting blocked websites. In this post, I will introduce a method for finding and using free VPNs on iPhone. Note that the VPNs are free and the providers are not identified. Hence, only use this method for visiting public webpages or keeping visiting
Read more