Hacking Bitcoin Wallets Through Differences In JSON Parsers
How a subtle bug in a parser can leave your wallet empty.
Corrupted Bitcoin Wallet + 30 Lines Of Code = 3000 USD
Extracting private keys from a corrupted Bitcoin wallet.
MacBook Air - Hacking EFI Boot Password
Additional notes on hardware hacking the boot firmware of an old MacBook Air.
node-sqlite3 - I simply can not do it alone.
It’s time for other people to help out.
Particl - A Private and Decentralized Marketplace
A presentation about Particl and how we intend to develop a more private and decentralized marketplace for the world.
Electron-sandbox - creating more secure electron applications
A simple code example of a sandboxed renderer process with the ability to communicate with backend (main.js) through IPC in a secure manner.
Unique Ring Signatures (URS) - broken cryptography
Disclaimer: the vulnerable code is not critical to the Monero cryptocurrency.
The code is in no way or form used in the reference client of the CryptoNote protocol.
However the code is managed by the Monero Project. The repository is under the name of the project so it should be held to some standards.
Having old code laying around and disregarding it is not very smart.