Open in app

Sign in

Write

Sign in

nixops
nixops

57 Followers

Home

About

Nov 26, 2020

Houses of Cards.

*This article is a look into the houses of cards that comprise what most rely on every day for entertainment, information, and daily life. Where possible proper disclosure practices were followed. This article is a continuation of Wardialing 2.0 and Broken Foundations. …

14 min read

Houses of Cards.
Houses of Cards.

14 min read


Nov 25, 2020

Cypherpunk Labs, hard truths, and exposing lack of journalistic integrity

This is a response story in regards to the following story about me. Journalism A journalist should spend time to investigate the full story before jumping down and writing an article with misinformation. I had planned to release an article at the end of the week discussing what went wrong with…

24 min read

Cypherpunk Labs, hard truths, and exposing lack of journalistic integrity
Cypherpunk Labs, hard truths, and exposing lack of journalistic integrity

24 min read


Nov 4, 2020

Bitcoin, The Greatest Revolution That Could Have Been….

Disclaimer: ** This article is written from a perspective of a bitcoin supporter for over ten years, software engineer, and distributed network supporter. ** Cypherpunk Movement In the 1970’s and 1980’s the use of encryption and cryptography was not widely available for the average person. It had been long reserved for military and spy agencies. This would change once the United States government publication on Data Encryption Standard were made public. …

Bitcoin

15 min read

Bitcoin, The Greatest Revolution That Could Have Been….
Bitcoin, The Greatest Revolution That Could Have Been….
Bitcoin

15 min read


Oct 24, 2020

Broken Foundations

*This article is for education purposes only. Some tools are not explicitly disclosed for liability issues. You can find them on your own and do your own research on them. DO NOT BREAK THE LAW, consult with counsel about laws in your jurisdiction. Also be mindful you may violate a Terms of Services for some providers in reproducing these attacks even against yourself.* Registration As pointed out in the Wardialing 2.0 article in this series, majority of services today rely on user phone registration. This is a terrible foundation as a setup flow but many of these companies use this model as a override for password resets as well. You can test this for…

Security

13 min read

Broken Foundations
Broken Foundations
Security

13 min read


Oct 22, 2020

Wardialing 2.0

Disclaimer: After some serious time consulting with WOPR, I wanted to address the giant elephant in the room that many of you are reliant on and some of you think you are being clever with using. This information is provided for educational and safe preventative measures. What you do with it…

Security

18 min read

Wardialing 2.0
Wardialing 2.0
Security

18 min read


Dec 21, 2019

Seeing things differently.

The following article is presented as an overview. Specific information including source code will be published soon(See update below.). We have to scrub hard coded values and tool it to be applicable for anyone. This experiment was using CB radio to transmit a picture over morse code from a remote…

Blockchain

6 min read

Seeing things differently.
Seeing things differently.
Blockchain

6 min read


Published in

The Dark Side

·Sep 13, 2019

A Misunderstood Threat

By nixops on ALTCOIN MAGAZINE — The following article will hopefully shed light around a threat vector that is overlooked. This threat vector is now beginning to become very critical for the safety of the users of bitcoin and cryptocurrency as a whole.

Bitcoin

6 min read

A Misunderstood Threat
A Misunderstood Threat
Bitcoin

6 min read


Jul 12, 2019

Trustless or Bust!

Trustless Technology changes constantly, with it comes improvements or at least we hope it does. Currently people are becoming more and more enamored with the idea of using a blockchain and cryptocurrency. Keep in mind that a cryptocurrency is a bi product of the network sustainability of a consensus. What…

Blockchain

8 min read

Trustless or Bust!
Trustless or Bust!
Blockchain

8 min read


Published in

The Startup

·Dec 5, 2018

Energy Efficiency and Security

This article’s original text is stored on the blockchain using CloudBurst, it can be obtained from the following CloudBurst ID: CLOUD-9VRC-MB5N-SN6Q-HEEJS. First World Thinking Often times we discuss how economic systems get started and things of that nature related to cryptocurrencies. I think it is often misunderstood what exactly is happening in these…

Bitcoin

6 min read

Energy Efficiency and Security
Energy Efficiency and Security
Bitcoin

6 min read


Sep 21, 2018

Bias and Censorship

The text version of this story can be found here. Retrievable with CloudBurst with the following CloudBurst ID: CLOUD-56NW-TVKZ-R47V-6R99A. CloudBurst uses the blockchain to upload content in a censor resistant model. Understand that in using methods as described you can preserve your message and it’s meaning. Censorship and bias can…

Blockchain

4 min read

Blockchain

4 min read

nixops

nixops

57 Followers

Sometimes I do things…

Following
  • Mark Helfman

    Mark Helfman

  • Gabriel Shapiro

    Gabriel Shapiro

  • Luke Johnson

    Luke Johnson

  • andylamgot

    andylamgot

  • The PoC Flâneur

    The PoC Flâneur

See all (28)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams