This article explores how we can use deep linking to invoke specific functionality in the IOTA wallets in a standardized way.
This article goes in-depth in the details of the IOTA signing process. Be prepared for some deep thinking because it is a complex process. I tried to simplify as much as possible, but I assume you have at least an idea of how the signing process works.
IOTA is a protocol designed for use by IoT devices. These devices will happily follow any rules to use the protocol strictly, optimally and safe. Sadly, humans are not so good at following rules -if they know them at all- and they often…
Here’s one that I get asked more often, and there’s a lot of nonsense ‘wisdom’ about it out there, so I am doing the calculations for you.
Here is the initial hurdle for anyone trying a seed: you will need to convert the seed into…
(Steps to help you find your balance after a snapshot)
This is the latest incarnation of an article I wrote around the time of the October 2017 snapshot. I had been helping so many people find their balance again that I decided that my time would be…
This article describes my view on the IOTA vs DCI situation and explores why I would happily use Curl to secure IOTA.
In my previous two articles I explored possible solutions to the IOTA donation address problem and the IOTA address alias problem . Since both solutions were written up as kind of spur-of-the-moment articles…
For many months now we constantly see the same report showing up in FUD articles about IOTA. The report is continuously being used to show that IOTA is vulnerable to theft because the signing process uses the Curl hash function, which is supposedly unsafe.