Tag: IT
-

From Wax Tablets to Elliptic Curves: A Brief History of Cryptography (Part Two)
With the advent of modern electronic computers, it has been possible to exploit the computational power of processors to automate message encoding and decoding procedures.
-
What happens in the Blockchain does NOT stay in the Blockchain – Part Four –
We continue to correlate addresses with each other, so as to better define the activities of the subjects we are studying.
-

How to Recover Access to a Bitcoin Wallet with BTCrecover (or at least try)
Let's see how to use the btcrecover.py tool to find the password of a bitcoin wallet.
-

What happens in the Blockchain does NOT stay in the Blockchain – Part Five –
We conclude our analysis by trying to understand where bitcoins were exchanged for FIAT currency, “exiting” the blockchain.
-

Who do you want to be interested in my online gaming profile?
Many people find extra security measures on their Epic, Steam, and other gaming profiles an unnecessary hassle... are they right? Probably not.
-

I know who you are because “I Know What You Did Last Summer”.
How much could my browsing history reveal to the sites I visit?