Most companies and software are moving to using this thing called containers to run their apps. If the metaphor does not make sense to you, don’t worry: I will simplify it for you. We will also see, as we head into 2023, under which circumstances virtual machines are still useful. What is a Virtual machine?…Continue readingVMs vs. containers: Which one should you use in 2023?
The world isn’t just full of PCs and mobile devices, there are a class of computers which play a major part in computing as we know it today. There are many different types of servers you need to know about, and we will cover them and their uses in this post. What is a server?…Continue readingEverything you need to know about servers
Today I had someone contact me asking me for help in recovering a wallet he had purchased. Long story short, he was scammed out of a lot of money, to buy this wallet. He actually had the private key, but he was unable to spend from it. He got the following error when trying to…Continue readingAttention: Don’t buy wallet.dat files (Here’s why)
A few weeks ago, I made BitcoinCleanup.com, a website that is supposed to counter the Greenpeace FUD about Bitcoin and Proof of Work they put at cleanupbitcoin.com. As you can see, I just reversed the two words in the domain name, as a little satire towards them. BitcoinCleanup already has a strong following on Bitcointalk,…Continue readingBitcoinCleanup.com – Countering PoW criticism
The question which people keep asking themselves in the aftermath of Ethereum’s merge is: Does Bitcoin want to make such an eco-friendly change? And there is a lot of news surrounding the merge (or the Merge, as ETH advocates like to call it) regarding the creation of some token to revive Ethereum Proof-of-work mining. Governments…Continue readingBitcoin Being Energy Efficient?
Recursion is one of those useful concepts that you learn in college in programming class and also on online tutorials. It enables a wide range of problems to be solved that otherwise can’t be performed, such as quicksort and binary search. Morever, recursion works in all languages because the underlying concept is the same. However,…Continue readingHow To Flatten A Recursive Function
What is this? This is your periodic reminder that Craig Wright is not Satoshi. Nobody should believe his false claims. This page will list a timeline of notable events related to his abortive ligitation against Bitcoin Core developers, the bitcoin.org domain owner Twitter users, and everyone else he has a passing hatred of. Events are…Continue readingCraig Wright is not Satoshi (2022 edition)
It has been warned that you should not use the same private key to generate both ECDSA signatures and Schnorr signatures. That is because there may be a method for people to extract secret data when the two of them are combined. While there isn’t a confirmed attack that uses this method, as is the…Continue readingECDSA and Schnorr signatures from the same private key
This is a BIP I made that specifies how Multisig outputs should be created when Taproot is used. It also demonstrates how to spend those outputs. This BIP gives guidance to implement Multisig using Taproot with script paths to provide maximum privacy. Multisig Taproot addresses are created almost the same way as Native Segwit addresses,…Continue readingBIP-multisig-taproot
This is a BIP I made that attempts to standardize the process or signing and verifying public-key-hash addresses (P2PKH, P2WPKH-P2SH, P2WPKH, P2TR, in other words: Legacy, nested Segwit, native Segwit, and Taproot). It closely mimics BIP 137, in fact it is a strict superset of it It was declined by the mailing list on the…Continue readingBIP-notatether-messageverify