From Single Key to Sophisticated Computation: The Evolution of Crypto Exchange Custody

When the first cryptocurrency exchanges sprung up in late 2010, multisig wallets had yet to be invented. As a result, a single private key was commonly used to control all customer funds. Today, multisig has been complemented by sophisticated solutions such as Unbound Tech’s CASP, which uses secure multi-party computation. Despite these innovations, many exchanges … Read more

How to Hide Your Bitcoin – Opsec, Anonymity, Cold Storage, Brainwallet, Dexes and Non-Custodials

In an era of increasing economic uncertainty, surveillance, specialized cybercrime and hacking, knowing how to hide bitcoin safely has become a paramount concern for crypto holders. Whether it’s by way of taking wise opsec measures, utilizing noncustodial tools, leveraging a DEX, or even storing seed phrases in your brain, there’s no shortage of measures that … Read more

The Full IOTA Network Incident Report has been Released

The recent incident affecting the IOTA network still leaves many people surplussed. A full incident report has finally come to light, which puts things in their proper perspective.  It is rare for a cryptocurrency network to be halted completely. Documenting the IOTA Network Hack This is especially true when it comes to developers causing this … Read more

What We Have Learned From The Altsbit Hack

Last week Altsbit, a centralized crypto exchange based in Italy, announced that it had been breached, and it would be closing down after losing most of the user funds it held, including BTC, ETH, ARRR, and VRSC. Even though a small part of the funds stored in cold wallets was left untouched, the hack effectively … Read more

How to Use a U2F Key to Secure Your Crypto Accounts

Universal 2nd Factor (U2F) is an open standard for strengthening two-factor authentication. It involves the use of a physical key to reinforce 2FA, hardening your online accounts from attack. In this guide, we’ll explain how to use a Yubikey to lock down your exchange account, email account, and other valuable online accounts. Also read: German … Read more

Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks

A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics. Since the group’s infamous previous … Read more