Mayowa Olatunji (@web3MIO)How Does Multi-Party Computation Affect Web3 Security?Incidents of compromised private keys, unauthorized access to sensitive information, and the relentless targeting of centralized points of…Sep 6Sep 6
Andrey MakarovKey management system for beginnersNot so long ago, at a muggle job, we had a question about storing private keys for various services. In the process, we found several…Jul 17Jul 17
Crypto TechnologiesExploring the Principles of Shamir Backup: Advantages and DrawbacksIn this article we will look at the encryption rules of Shamir Backup. You will understand how the Shamir cipher works and also discuss the…May 9May 9
The Bitcoin HoleinThe Bitcoin HoleHow to Safely store your Hardware Wallet Seed PhraseSome good practices to safely store your Cold Wallet Seed Phrase.Apr 12Apr 12
The Bitcoin HoleinThe Bitcoin HoleThe best ways to protect the seed phrases of your Bitcoin walletsHow to avoid someone stealing your Bitcoin after physical access to your seed phrase.Apr 8Apr 8
김인근Shamir’s Secret Sharing (SSS): Uncovering the Cryptography Hidden in Triple SLet’s take a look at how Sharmir’s Secret Sharing (SSS) works and where it can be applied.Apr 3Apr 3
Steven[Blockchain Basics] Secret Sharing (High School Edition)Secret sharing schemes are highly suitable for storing highly sensitive and crucial information, and have been researched for many years in…Mar 26Mar 26
JosezaratesousaSecretos compartidos entre varios participantesImaginemos que poseemos información sensible, como un código utilizado para cifrar datos, la autorización para una transferencia, la…Feb 28Feb 28