Making machines sweat.

Bitcoin links

Here, have a look at some links: C-SPAN (search for ‘bitcoin’ there) Edward Felten (Princeton University, Feb 2014) Future Digital Currency Panel (Atlantic Council, Apr 2014) Naomi Brockwell (Billy’s Bitcoin, Jul 2018) short movie web site movies: The Rise and Rise of Bitcoin other movies mentioned at bitcoin.org resources Why 21m (million) bitcoins? Warren Buffett, one of the world’s richest investors, says the total amount of gold in the world - the gold above ground, that is - could fit into a cube with sides of just 20m (meter = 67ft). Read more →

Macbook Startup Sound

Disclosure: MacBook Pro helped me in the computer world since December 2012. I bought it myself around San Francisco and loved its ANSI keyboard (because it is very good to touchtype DVORAK on it). This year I bought a used MacBook Air from its first owner, again a model bought originally in the U.S. This one is Linux-only since the beginning and it works reliably well. Here is what I found at the Arch Linux wiki regarding how to mute the startup chime and it worked. Read more →

Decentralized communication

Here are some alternatives to Facebook: Tox https://tox.chat/ Ring https://ring.cx/ Briar https://briarproject.org/ Matrix https://matrix.org/ Coy.IM https://coy.im/ Demonsaw https://www.demonsaw.com/ Retroshare http://retroshare.net/ Wire https://wire.com/ (Swiss-made) CryptoCat https://crypto.cat/ orbit.chat https://orbit.chat/ Ricochet.im https://ricochet.im/ See also: https://prism-break.org/en/ https://ssd.eff.org/ https://ianix.com/pub/ed25519-deployment.html https://eprint.iacr.org/2016/1028.pdf (local copy) https://www.freehaven.net/anonbib/date.html Read more →

Securing Speedport Entry 2i

In Slovakia there is this VDSL router offered by one of the main providers. Each such router has a different default admin password and I assume it is derived from the MAC address or the serial number of the router. By default all ports (53, 80 and 443) are open to the wide world outside, i.e. a network operator who can access the device can log into it from outside if needed. Read more →