Sign in

The issues facing us today are incomparable to any other time. Humanity has never faced a moment quite like this.

Let’s run down the series of events we are currently facing:

With the news of Google achieving “quantum supremacy”, I found it pertinent to speak about the current landscape of quantum computing. What does this mean to us as a potential threat? What is currently being done in the world of cryptography to further protect/prepare us.

Google along with a few other major tech players are currently developing their own quantum computers. The companies working on this are the largest tech companies ranging from IBM to Lockheed Martin to Microsoft. Before we dive into the importance of what Google has achieved, first we must understand the current working environment.

Where We Are Now

Quantum computing…

Bitcoin transaction grouping provided by Elliptic

We constantly hear the dangers that centralized exchanges face. Stealing of assets is the biggest concern. The remote nature of a crypto hack causes people to feel they’re so vulnerable since inherently, it can come from anywhere. I think there is a bigger threat than a crypto robbery of an exchange. The information that is potentially available to attackers if they are to gain access to crypto exchange data will cause much more damage than funnelling of stolen crypto funds.


The linkability of real world identities to crypto addresses make it extremely easy to use publicly available information against someone…

This past weekend, the Monero comuntiy hosted its first conference in Denver. The event was livestreamed and also consisted of a collaboration panel with zcash at zcon1. zcon1 was held on the same weekend in Croatia. I was invited to speak on the topic of “Network Attacks and Obfuscation of Payment Channels” My slides from the event are available at

The video from the talk is located here: Network Attacks and Obfuscation of Payment Channels

As well as the rest of the talks/livestream are located here for Saturday (6/22/2019): MoneroKon day 1 livestream

The Livestream for Sunday (6/23/2019) are located here: MoneroKon day 2 livestream

The playlist for zcon1 talks are located here: zcon1 playlist

With the exit scam and proceeding arrests of administrators for the dark web market Wall Street Market(WSM), there are some important takeaways from the investigative work on the blockchain forensics. The arrests arose from the de-anonymizing of the bitcoin that were tumbled by the administrators of WSM.

The largest concern here is not so much that these anonymization services are failing but that the online operational security practices of the people interacting on the site were so poor. There were references in the DoJ document segregation of accounts between a specific user. Page 28 and 29 of the DoJ document…

The BTC withdrawal from Binance’s hot wallet

The first major hack of Binance occurred yesterday. 7,074 BTC were stolen from Binance’s hot wallet. In a press release, Changpeng Zhao, Binance’s CEO stated :

We have discovered a large scale security breach today, May 7, 2019 at 17:15:24. Hackers were able to obtain a large number of user API keys, 2FA codes, and potentially other info. The hackers used a variety of techniques, including phishing, viruses and other attacks. We are still concluding all possible methods used. There may also be additional affected accounts that have not been identified yet.

Much of what I am suggesting are based…

Grin Mainnet Node/Wallet setup

Today marks the mainnet launch of Grin. I have put together a guide for launch. It is VERY rough and there will definitely be a few edits along the way.

I have gathered resources from the respected github repo’s and included the sources as you should be doing your own verification. I would like to thank the Grin community as they have tirelessly been getting ready launch day. Once again, this is a guide to help point you in the right direction and things might break along the way as everything is still very new.

Install required Software and Packages


1. Open a terminal…

In the final week of 2018, three hardware researchers disclosed several attacks against 2 cryptocurrency hardware wallet companies. These 3 researchers have been disclosing vulnerabilities since 2017. On December 27th, 2018 they disclosed these attacks against the two largest personal crypto hardware wallet providers, Ledger and Trezor.

Also Read: Best Bitcoin Hardware Wallets

After reviewing these specific attacks, I decided to write about the potential danger these attacks pose and what a crypto-holder can do to prevent attacks mentioned. The attacks were disclosed at the recent Computer Chaos Congress in Leipzig by 3 researchers who detailed a handful of different…

Timothy May on the cover of the second issue of Wired magazine with 2 fellow cypherpunks

Sadly, this past week we lost an icon that helped to spur the cypherpunk movement. Timothy May, who wrote The Crypto Anarchist Manifesto in 1988, lauched a movement that is still very prominent today. For the uninitiated, a Crypto-Anarchist focuses on subverting the current laws and using new technologies to the benefit of the common man. In the original manifesto, May says crypto-anarchy focuses on “encryption, digital money, anonymous networks, digital pseudonyms, zero-knowledge, reputations, information markets, black markets, collapse of governments”.

The manifesto was written just before the first crypto wars began during the early 1990’s. The governments of the…

When asked what services I use for something like email or cloud storage, I always to suggest to future proof against an encroaching data breach or information leak. Leaning heavily on privacy and security applications that respect their customer’s data. There are many more services that are now available that were not around even a few years ago. People are looking for these security tools, you just need to know what to look for. You should consider a few fields when deciding on what type of service to use.


Airfoil focuses on implementing infrastructure based in best security practices for the custody of digital assets.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store