Securing your digital home – part 3: keys and other secrets

In part 2 of this series we walked through the thought process around your digital ID. Once that’s established, you need to protect the keys and other secrets attached to this identity, such as passwords and cryptographic keys. In this blog post I will write about my own personal approach to this with some recommendations. … Continue reading Securing your digital home – part 3: keys and other secrets

Fungibility – why Bitcoin or Ether aren’t the most democratic currencies yet

Fungible currency is, or must be, a cornerstone of a democratic and free society. In this blog I will explore what a fungible currency is and why Bitcoin and Ether currently are lacking in this respect. What does “fungible” mean? Goods or items in a collection are “fungible” if all of the items have the … Continue reading Fungibility – why Bitcoin or Ether aren’t the most democratic currencies yet

What is Urbit?

If you thought blockchain and cryptocurrencies are the most avant-garde or anarchist technologies of today, I will say you’re wrong. There’s an even bigger and bolder idea out there that I’ve been following for a while — it’s called Urbit. I must admit that I didn’t fully understand Urbit, until recently when I started playing … Continue reading What is Urbit?

Should developers be responsible for potentially harmful software?

With the recent news concerning the arrest of Marcus Hutchins — the security researchers who stopped the biggest-ever ransomware attack — I’ve been thinking (more than usual) about the ethics of software development. But before we go into that, who’s Marcus Hutchins and what did he really do? Hutchins, is a so-called security researcher which … Continue reading Should developers be responsible for potentially harmful software?

Non-technical explanation of encryption and digital signatures

Having a basic understanding of encryption and digital signatures has become important as history has repeatedly taught us that we can’t trust everyone on the Internet (e.g. Internet service providers, email services etc.). This blog post will try to explain in a non-technical way how encryption and digital signatures work and why something called “private … Continue reading Non-technical explanation of encryption and digital signatures