Blind protocol and mnemonic seeds
In a previous post, we illustrated our Blind Protocol, which allows two operators to create a paper wallet splitting the private key so that nobody…
Read more →In a previous post, we illustrated our Blind Protocol, which allows two operators to create a paper wallet splitting the private key so that nobody…
Read more →It might happen that we want to share some kind of information with a third party without the need to writing down the information in…
Read more →In some cases it may be necessary to create private keys to securely store funds for others, for instance, when seizing cryptocurrency for the judicial…
Read more →Generating private keys is perhaps the most delicate aspect in relation to the custody of cryptocurrencies. There are a lot of methods to obtain keys,…
Read more →There are a lot of rumors about hardware wallet clients tracing their customers, collecting their data through official clients. One of the most common hardware…
Read more →Let's hypothesize we are receiving a transaction from a friend but he has set up a very low fee and the transaction gets no confirmation.
Read more →