Passphrases Are Not the Solution for Bitcoin CustodyThe problems with passphrasesJun 30, 2023Jun 30, 2023
Bitcoin and the Dunbar LimitDisclaimer: This essay contains my personal opinions and deductions.Nov 24, 2021A response icon9Nov 24, 2021A response icon9
Introducing Nunchuk: Multisig Made EasyBitcoin, year 11.Oct 31, 2020A response icon2Oct 31, 2020A response icon2
Why Ethereum Architecture is FlawedIn its 3+ years of existence, Ethereum has seen no shortage of controversies. From the DAO hack, to the long-anticipated transition to…Jan 16, 2019A response icon19Jan 16, 2019A response icon19
Bitcoin: Two Parts Math, One Part Biology“The Times 03/Jan/2009 Chancellor on brink of second bailout for banks”Jan 3, 2019A response icon5Jan 3, 2019A response icon5
Bitcoin’s Incentive Scheme and the Rational IndividualUnlike Proof-of-Work and Public-Key Cryptography, the third component of Bitcoin is not based on math, but human behavior. Specifically…Dec 24, 2018A response icon8Dec 24, 2018A response icon8
How Cryptography Redefines Private PropertyWe will explore the pivotal role public-key cryptography plays in the creation of digital hard money & its ramifications on society at…Nov 27, 2018A response icon8Nov 27, 2018A response icon8
Work is Timeless, Stake is NotMuch has been written about Proof-of-Stake (PoS).Oct 12, 2018A response icon22Oct 12, 2018A response icon22
Code Reusability vs. Accidental CommonnessReading Jimmy Song’s excellent breakdown of the recent Bitcoin bug CVE-2018–17144 reminds me of the constant conflict between:Oct 3, 2018A response icon1Oct 3, 2018A response icon1
Feedback Loop vs. Circular ReasoningFeedback loop and circular reasoning fallacy are highly common, but they involve very different types of circularity.Sep 28, 2018Sep 28, 2018