Blind protocol and mnemonic seeds
In a previous post, we illustrated our Blind Protocol, which allows two operators to create a paper wallet splitting the private key so that nobody…
Read more →In a previous post, we illustrated our Blind Protocol, which allows two operators to create a paper wallet splitting the private key so that nobody…
Read more →In some cases it may be necessary to create private keys to securely store funds for others, for instance, when seizing cryptocurrency for the judicial…
Read more →Generating private keys is perhaps the most delicate aspect in relation to the custody of cryptocurrencies. There are a lot of methods to obtain keys,…
Read more →Let's hypothesize we arranged our super secure cold storage to "hodl" cryptos until they get to the moon, maybe using one of our tools like…
Read more →In a previous post, we have seen how to obtain a paper wallet by rolling a dice 256 times and tracking results with dicetracker.py, a…
Read more →DISCLAIMER: This post contains some suggestions that could be helpful for law enforcement agencies or security consultants that need to seize cryptocurrencies. It aims to…
Read more →