Knowing when a breach has taken place is extremely important - nobody in an organization will begin to react appropriately if everything appears to be running smoothly. Unfortunately, it can be quite difficult to actually detect, at least until it's too late. Our hot wallet sure is running low! Time
During my initial dirty-hack of the coindroids system for defcon/defcoin, we took a lazy step and just pre-populated an address table with a boatload of addresses generated outside the system. While this was great for preparing for a three day conference, it obviously isn't ideal for a real production
> It's the year 20XX, long since the original accounting droid, the EconoDroid, had been created by the humans. The droids have since learned quite a bit from their once squishy overlords and now conduct war purely with money, specifically the blunt ample math based instrument that are cryptocurrencies. Droids themselves
As I spoke about in a previous post [https://www.genesisbloc.com/how-to-lose-your-ibm-bluemix-account/], I am fairly drawn to details about DEFCOIN [http://defcoin.org], the cryptocurrency set to make its major debut at DEF CON 22 [http://defcon.org/html/defcon-22/dc-22-index.html]. Under the hood, DEFCOIN is just another
The intention is to use this site to discuss adventures and musings as they relate to the world of crypto-currencies. It will be heavily focused on security but other topics such as technological advances, usability, (biased) speculation, and current events will likely make their way into the texts as well.