Why retailers and services might choose to offer cryptocurrency

Given the distinction between coins and tokens, it shouldn’t be a surprise to learn that most of the cryptocurrency tokens out there aren’t widely used outside of trading or their specific blockchain ecosystem. Even though cryptocurrencies that are intended to be used as money, they face a challenge in convincing merchants to incorporate them as… Continue reading Why retailers and services might choose to offer cryptocurrency

How & where to spend crypto

What you’ll learn How different cryptocurrencies are created for specific purposes Why retailers & services might choose to offer cryptocurrency The most common things you currently spend cryptocurrency on A list of the most popular websites & services accepting cryptocurrency right now Cryptocurrency is a new form of internet money with properties that suggest it… Continue reading How & where to spend crypto

SMS Hijacking

Having just encouraged the use of 2FA as standard for custodial services, we now have to warn that choosing SMS as the 2FA can create a serious vulnerability via SMS hijacking. If attackers know your mobile number and provider, and have harvested personal information from OSINT, they can impersonate you with your Mobile Service Provider… Continue reading SMS Hijacking

Brute Force Attack

It’s one of the oldest and most obvious techniques for trying to steal someone’s password, running a software that churns through password options. This can be used in conjunction with information known about the user from OSINT – Open Source Intelligence. The best way to mitigate this kind of threat is to use two-factor authentication… Continue reading Brute Force Attack

Returning To The Concept of Custody

If you read the first article in this section you’ll be familiar with the concept of custody, which is central to cryptocurrency ownership. Custody refers to how you manage responsibility for the one critical piece of information that enables control of your crypto – a Private Key or Seed. As cryptocurrency works without a central authority like a bank,… Continue reading Returning To The Concept of Custody

Security best practice

What you’ll learn You are ultimately responsible for your crypto Things to protect against; accidental loss & theft Best practice & sleeping soundly at night If you’ve reached this stage in our series of articles on how to use cryptocurrency, you’ll have invested considerable time and hopefully some of your money; putting into practice what… Continue reading Security best practice

How transparency  is being leveraged

The radical transparency of crypto transactions is powering an entire industry of blockchain analysis. Companies such as Chainalysis and Elliptic are employing advanced data science techniques to provide custom tools for  customers who range from governments to hedge funds with tools to either ensure their own transactions are compliant with rules around of the movement… Continue reading How transparency  is being leveraged