Disclaimer:

** This article is written from a perspective of a bitcoin supporter for over ten years, software engineer, and distributed network supporter. **

Cypherpunk Movement

In the 1970’s and 1980’s the use of encryption and cryptography was not widely available for the average person. It had been long reserved for military and spy agencies. This would change once the United States government publication on Data Encryption Standard were made public. …

This picture captures the foundation used for most modern applications and services.

*This article is for education purposes only. Some tools are not explicitly disclosed for liability issues. You can find them on your own and do your own research on them. DO NOT BREAK THE LAW, consult with counsel about laws in your jurisdiction. Also be mindful you may violate a Terms of Services for some providers in reproducing these attacks even against yourself.*

Registration

As pointed out in the Wardialing 2.0 article in this series, majority of services today rely on user phone registration. This is a terrible foundation as a setup flow but many of these companies use this model as a override for password resets as well. You can test this for…

An old modem attached to a phone, the golden era of connecting to other computers

Disclaimer:

After some serious time consulting with WOPR, I wanted to address the giant elephant in the room that many of you are reliant on and some of you think you are being clever with using. This information is provided for educational and safe preventative measures. What you do with it…

The following article is presented as an overview. Specific information including source code will be published soon(See update below.). We have to scrub hard coded values and tool it to be applicable for anyone. This experiment was using CB radio to transmit a picture over morse code from a remote…

Trustless

Technology changes constantly, with it comes improvements or at least we hope it does. Currently people are becoming more and more enamored with the idea of using a blockchain and cryptocurrency. Keep in mind that a cryptocurrency is a bi product of the network sustainability of a consensus. What…

This article’s original text is stored on the blockchain using CloudBurst, it can be obtained from the following CloudBurst ID: CLOUD-9VRC-MB5N-SN6Q-HEEJS.

How every ICO sees it’s beginning as to save the world from fiat!

First World Thinking

Often times we discuss how economic systems get started and things of that nature related to cryptocurrencies. I think it is often misunderstood what exactly is happening in these…

The text version of this story can be found here. Retrievable with CloudBurst with the following CloudBurst ID: CLOUD-56NW-TVKZ-R47V-6R99A. CloudBurst uses the blockchain to upload content in a censor resistant model. Understand that in using methods as described you can preserve your message and it’s meaning.

Censorship and bias can…

nixops

Sometimes I do things…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store