Category

Privacy & Security

  • Introducing CCSS — The Cryptocurrency Security Standard
    Introducing CCSS — The Cryptocurrency Security Standard

    < 1 minute Implementing standards is essential in any industry, including crypto, where hundreds of millions of dollars worth of digital assets are transacted and traded on exchanges daily. Different trading platforms and crypto wallets have ways of keeping digital assets secure. However, having a Cryptocurrency Security Standard allows for unified methodologies that users and…

  • Solana Hack: What Actually Happened?
    Solana Hack: What Actually Happened?

    < 1 minute In early August, the Solana crypto community was rocked by what looked like an unsolvable hack that drained roughly $4.5 million in SOL from several thousand users’ wallets. An initial estimate by the team at MistTrack had identified 8,000 affected wallets with their funds being siphoned off to four addresses belonging to…

  • Introducing CCSS – The Cryptocurrency Security Standard
    Introducing CCSS – The Cryptocurrency Security Standard

    3 min read In 1999, NASA lost a $125 million Mars orbiter because Lockheed Martin engineers used the English measurement system, whereas the NASA team used the metric system. The mismatch in units caused navigation errors leading to the loss of the said orbiter.  Such an example highlights why implementing standards is essential in any industry, including…

  • Doxing: What It Is and How to Prevent It
    Doxing: What It Is and How to Prevent It

    8 min read Navigating the internet without leaving bread crumbs of your presence is increasingly becoming difficult as our real-life identities are tied to our online ones. As a result, online privacy is vital as you do not want personal information in the hands of hackers, extortionists, and other malicious individuals.  What is Doxing?  You…

  • Central Bank Digital Currencies (CBDC) – The End of Cash?
    Central Bank Digital Currencies (CBDC) – The End of Cash?

    5 min read Crypto adoption, particularly of stablecoins, has brought to light real-life use cases of digital assets as a means of transferring value quickly and cheaply compared to the traditional financial system. Crypto holders can send Bitcoin, Ethereum, USDT, or USDC to their family and friends worldwide at a fraction of the cost and…

  • The Impact of Litecoin’s MimbleWimble Privacy Upgrade
    The Impact of Litecoin’s MimbleWimble Privacy Upgrade

    3 min read On May 19th, 2022, Litecoin’s highly anticipated MimbleWimble upgrade was deployed on the LTC network at block 2,257,920. The upgrade, named after a tongue-tying spell from the Harry Potter series of books and movies, had been in discussion within the Litecoin community from as way back as 2016 when it was proposed by a…

  • An End to the ‘Wild West’ of Unregulated Crypto
    An End to the ‘Wild West’ of Unregulated Crypto

    4 min read On June 30th, EU legislators from its Parliament, Commission, and Council reached a deal on the Markets in Crypto Assets bill (MiCA) and Transfer of Funds Regulation (TFR) bill. The two landmark bills marked the beginning of what many believe is the EU setting the pace for the rest of the world…

  • Crypto Wallet Security: Features that Matter and Best Practices
    Crypto Wallet Security: Features that Matter and Best Practices

    5 min read 2022 has been a big year for crypto hackers. A recent report estimated that a total of $1.4 billion had been lost through attacks on cross-chain bridges since the year began. Another report gave a $2 billion approximation of the total crypto lost due to DeFi hacks in the first half of 2022.   The attacks on…

  • Solana Wallet Hack. What happened?
    Solana Wallet Hack. What happened?

    3 min read Earlier this week, the Solana crypto community was rocked by what looked like an unsolvable hack that drained roughly $4.5 million in SOL from several thousand users’ wallets.  An initial estimate by the team at MistTrack had identified 8,000 affected wallets with their funds being siphoned off to four addresses belonging to…

  • Blockchain Based Privacy Enhancing Technologies
    Blockchain Based Privacy Enhancing Technologies

    < 1 minute As Web3 continues to evolve and develop, there is an urgent need to focus on privacy on the blockchain in a similar, if not a more advanced manner, than what is available for Web2. Web3 users want to control their privacy on the blockchain and choose when they reveal personal information, such…

  • Phishing Attacks: How to Safeguard Your Crypto and NFTs Against Them.
    Phishing Attacks: How to Safeguard Your Crypto and NFTs Against Them.

    3 min read 2022 is a big year for hackers and scammers targeting the crypto community and various DeFi projects. It is estimated that $2 billion has been stolen in DeFi hacks in the first half of 2022. If the current pace of theft in the crypto-verse through hacks continues, the total stolen by the end of…

  • Compliant Privacy — Simple Explainer.
    Compliant Privacy — Simple Explainer.

    6 min read Internet users have a right to have their data handled appropriately and according to the various global privacy and security laws. Jurisdictions such as the EU have gone as far as requiring internet-based companies to inform their consumers on how their data is being used immediately they visit their website or transact on their…