Categories
Miscellaneous

BitcoinCleanup.com – Countering PoW criticism

A few weeks ago, I made BitcoinCleanup.com, a website that is supposed to counter the Greenpeace FUD about Bitcoin and Proof of Work they put at cleanupbitcoin.com. As you can see, I just reversed the two words in the domain name, as a little satire towards them. BitcoinCleanup already has a strong following on Bitcointalk,…Continue readingBitcoinCleanup.com – Countering PoW criticism

Categories
Wall Observer Talk

Bitcoin Being Energy Efficient?

The question which people keep asking themselves in the aftermath of Ethereum’s merge is: Does Bitcoin want to make such an eco-friendly change? And there is a lot of news surrounding the merge (or the Merge, as ETH advocates like to call it) regarding the creation of some token to revive Ethereum Proof-of-work mining. Governments…Continue readingBitcoin Being Energy Efficient?

Categories
Basics Guides

How To Flatten A Recursive Function

Recursion is one of those useful concepts that you learn in college in programming class and also on online tutorials. It enables a wide range of problems to be solved that otherwise can’t be performed, such as quicksort and binary search. Morever, recursion works in all languages because the underlying concept is the same. However,…Continue readingHow To Flatten A Recursive Function

Categories
Wall Observer Talk

Craig Wright is not Satoshi (2022 edition)

What is this? This is your periodic reminder that Craig Wright is not Satoshi. Nobody should believe his false claims. This page will list a timeline of notable events related to his abortive ligitation against Bitcoin Core developers, the bitcoin.org domain owner Twitter users, and everyone else he has a passing hatred of. Events are…Continue readingCraig Wright is not Satoshi (2022 edition)

Categories
Cryptography Talk

ECDSA and Schnorr signatures from the same private key

It has been warned that you should not use the same private key to generate both ECDSA signatures and Schnorr signatures. That is because there may be a method for people to extract secret data when the two of them are combined. While there isn’t a confirmed attack that uses this method, as is the…Continue readingECDSA and Schnorr signatures from the same private key

Categories
NotABips

BIP-multisig-taproot

This is a BIP I made that specifies how Multisig outputs should be created when Taproot is used. It also demonstrates how to spend those outputs. This BIP gives guidance to implement Multisig using Taproot with script paths to provide maximum privacy. Multisig Taproot addresses are created almost the same way as Native Segwit addresses,…Continue readingBIP-multisig-taproot

Categories
NotABips

BIP-notatether-messageverify

This is a BIP I made that attempts to standardize the process or signing and verifying public-key-hash addresses (P2PKH, P2WPKH-P2SH, P2WPKH, P2TR, in other words: Legacy, nested Segwit, native Segwit, and Taproot). It closely mimics BIP 137, in fact it is a strict superset of it It was declined by the mailing list on the…Continue readingBIP-notatether-messageverify

Categories
Miscellaneous Guides

WordPress Post Markup Cheat Sheet

As I type this, I am using the Block editor. However, sometimes, I also want to create and edit posts from VIM, and the extremely useful wp-cli tool. However, before you can do that, you need to already know that markup WordPress makes for its blocks. I searched far and wide, all over the net,…Continue readingWordpress Post Markup Cheat Sheet

Categories
Code Life

Python & Github Copilot – Good and Bad Areas

Originally posted on Github, I wrote I would place the list somewhere else if it gets too long, well, I can already see it getting too long so I placed a copy of it here on my blog. I’m compiling a list of problem domains where Copilot suggests the right function and works perfectly, and…Continue readingPython & Github Copilot – Good and Bad Areas

Categories
Code Life

Enable TLS For K8s Apps – It Almost Made Me Surrender

What happens when you got an unsecured database lying around somewhere? Bots will attack it. Everyone’s got to enable TLS to secure their internet-facing services. There’s simply no excuse now that you can buy them for cheap and with crypto, and even for free (Let’s Encrypt). But for some reason, you go to these cloud…Continue readingEnable TLS For K8s Apps – It Almost Made Me Surrender