technology

A Quick Guide to Online Privacy

A Quick Guide to Online Privacy

The recent Twitter hack is the latest reminder that even top companies with the best security teams are not immune against bad actors and data breaches, so why let them handle our sensitive data when we don’t need to? In this article I introduce concept of operational security and how you might begin to identify the information that is out there about you, analyze the risk of this exposure, and deny adversaries from exploiting this data.

Privacy in Crypto: Intro to MimbleWimble & Grin

Privacy in Crypto: Intro to MimbleWimble & Grin

In late 2016, a pseudonymous character named Tom Elvis Jedusor showed up on the bitcoin developers’ chatroom and posted a tor link, which hosted a single file named MIMBLEWIMBLE, outlining a new design for a privacy-preserving, massively prunable blockchain. Tom Elvis Jedusor, as some may recognize, is the name of Voldemort’s given name in the French Harry Potter books. Tom Elvis Jedusor to this date has never logged into the chatroom again. In this article I explore how MimbleWimble works, the first live implementation of the protocol, and privacy in crypto.