RSA Encryption With Primes

Security is about layers of difficulty. Nothing is full proof. But some methods of encryption have more layers of difficulty than others. Before computers, simply shifting the characters in the alphabet over some spaces was sufficient to stump most prying eyes. This is known as the Caesar cipher method, its implementation on in most computer programing languages uses the modulus operator to shifts the message over by a factor of a key and rotates around the alphabet in ASCII values.

Continue Reading →

Economic Concerns over the Bitcoin-XT Hard Fork

A Response to“Why Bitcoin is Forking

Everyone involved in the bitcoin community, whether they hold half a bitcoin or a thousand wants to see bitcoin grow in users and in value. No one is debating the desire to advance, we’re debating exactly how the advancement should be achieved. If you consider bitcoin a legitimate currency, you are necessarily accepting a broader definition of money that has ever existed before. Because Bitcoin is not only a store of value, it’s a digital payment system.

Fundamentally this question exposes ideological differences between people interested in Bitcoin. Is Bitcoin > more of a digital gold or is it more of a competitor to Square?

Gavin Andresen

Continue Reading →

A Proof-of-Existence Without Aliens, Ghosts, or God

Proving the exclusive rights to a document, while simultaneously guaranteeing the state of its existence, is all possible without mysticism or deities for anyone who is holding Bitcoin. Rants about bitcoin and the blockchain potential seem never ending. Bitcoins use in SSL certificates, distributed email, micropayments, crowdfunding, smart property all stretch far beyond its popularity and primary use as a currency. And as is true for any significant claim of mysticism or deities, a technology capable of proving existence, ownership, and integrity it is going to require a significant amount of explanation.

Continue Reading →

First Encounters with PGP

The first time I came across PGP, I was reading a blog post on the topic of identity with bitcoin public keys. The ideas discussed in the post compelted me to the point of searching around for the writers contact info. But instead of the typical name and email address I expected, all I found was a pseudonym and PGP fingerprint. I could figure this out I thought. That morning at the local breakfast spot I was talking to my friends about my encryption plans for the day. When the man sitting next to me at the restaurant overheard. A fellow PGP user, on his way to a python convention. He gave me his business card and said that if I ever figured out PGP I should try to send him an encrypted message.

PGP skills are a badge of honor. But the outside perception is that the only people willing to work for it are nerds and criminals.

Privacy is as apple-pie as the Constitution.

Phil Zimmerman

Continue Reading →

The Statism Epidemic

To date Statism, has no known vaccine and consumes the minds of 60-90% of people who contract it. It is transmitted via early contact with people with delusions of power, with the most common transmission being from parents to child. Once infected it is nearly impossible for the victim to know the delusions they suffer from. Symptoms of Statism include hallucinating lines or borders on landmasses, paranoia of people crossing these borders, believing people are better or worse than people on the other side, and pissing the colors of their state flag.

Continue Reading →