COINPRICES
TAP
H75pkfx
The BitLicense Hurts New York, Not Bitcoin

A Solution To Bitcoin’s Governance Problem (Decentralized & Open Source)
| techcrunch.com
Controlling your own wealth as a basic human right
| blog.coinbase.com
Bitcoin Price Soars, Fueled by Speculation and Global Currency Turmoil
| www.nytimes.com
Coinbase CoFounder Brian Armstrong: Completing our transition to becoming a digital currency company (not just a Bitcoin company)
| blog.coinbase.com
Bitcoin Has Trounced the Dow This Year, 124% to 14%
| www.wsj.com
Forget about Dow 20K: Bitcoin's about to hit $1,000
| www.cnbc.com
Bitcoin Investors Should Send A Thank You Note To India's Modi And Venezuela's Maduro
| www.forbes.com
Bitcoin And The Cashless Future
| www.forbes.com
BitGo instant, the on-chain solution for instant bitcoin commerce surpasses 10,000 BTC transacted per week, equivalent to $7M USD
| blog.bitgo.com
Bitcoin predicted to rise 165% to $2,000 in 2017 driven by Trump’s ‘spending binge’ and dollar rally
| www.cnbc.com
You have $1M to invest across bitcoin and ether. You cannot touch your investment for the next 5 years. How much of that $1M do you invest in each?
| blog.kraken.com
Someone Accessed Silk Road Operator’s Account While Ross Ulbricht Was in Jail
| motherboard.vice.com
IRS Requests Bitcoin Buyer Records in Broad Tax Evasion Case
| fortune.com
ZCash: The Untrusted Setup
| weuse.cash
ZCash is fundamentally insecure due to 'trusted setup'
| blog.okturtles.com
An American Fraudster : The Dirge of Christopher David, CEO of Arcade City
| medium.com
Five Reasons the Winklevoss Bitcoin ETF Should Be Approved
| www.bloomberg.com
Tuur Demeester: The Big Ethereum Short
| cointimes.tech
Winklevoss Brothers Choose State Street to Help Launch Bitcoin ETF
| www.wsj.com
LenderBot by Deloitte and Stratumn to bring insurance to the sharing economy using Bitcoin’s block chain
| bravenewcoin.com
A new NYSE-traded Bitcoin ETF is about to give the Winklevoss Bitcoin Trust a run for its money.
| coincenter.org
Ethereum's DAO Soft Fork is a Potential DoS Vector
| hackingdistributed.com
Ethereum is Doomed
| nakamotoinstitute.org
Bitcoin Surges to Two-Year High as Supply Seen Shrinking in July
| www.bloomberg.com
VIDEO: Winklevoss Twins: Bitcoin is Better Than Gold as Hedge
| www.bloomberg.com
Blockchain open sources Thunder network, paving the way for instant bitcoin transactions
| techcrunch.com
The Cryptographically Provable Con Man (Craig Wright is not Satoshi)
| dankaminsky.com
Australian Entrepreneur Says He Created Bitcoin, but Doubts Persist
| www.nytimes.com
Craig Wright revealed as Bitcoin creator Satoshi Nakamoto
| www.bbc.com
BitStamp Receives License to Operate in 28 EU Countries
| www.wired.com
Looting of the Fox: The Story of Sabotage at ShapeShift
| news.bitcoin.com

Secure Computing Guide

When it comes to using Bitcoin on a daily basis, one of the biggest issues preventing mainstream adoption is the current state of computer security. The average person can never be truly confident that their computer or smartphone is completely secure. Specifically, keyloggers are particularly effective against Bitcoin users, allowing malicious individuals to capture your keystrokes in order to steal passwords and private keys. There are many smart people working on a solution to this complex issue, but our users demand an answer now.

First and foremost, all long term savings should be stored in properly generated cold storage paper wallets. Since your private keys never touch the internet, no hacker or virus can steal your funds.

This is only a solution for savings, what about day to day Bitcoin usage?

Secure Computing for the Average User

For the average user, we recommend using a Chromebook and two factor authentication in combination with web wallets for their daily spending needs. Think of cold storage as your savings account, while this is your checking account.

Chromebooks

Chromebooks are laptops that run a modified version of Google’s chrome browser. They are full featured, secure, and very easy to use. They also happen to be extremely cheap, making them particularly useful as a dedicated secure machine. With Chromebooks, Google handles your computing security for you.

Chromebook

  • Chromebooks receive constant updates, for free, for life. Software that is not up to date can often lead to vulnerabilities which malicious individuals can exploit. With Chromebooks, updates are automatic and painless.

  • All Chromebooks are encrypted by default. Nobody can access your data without your Google password even if they have physical access to your hard drive. Neither Windows or OSX encrypts your hard drive by default, while Google’s integration is seamless. Make sure you have a secure Google password that you don’t reuse with other services. This site allows you to test the security of a given password. Use it to try different password techniques but make sure not to enter whatever password you decide to use.

  • Built in Virus protection that is always up to date. Google protects the entire ChromeOS ecosystem with it’s own built in, constantly updated, virus protection. Since they are able to administer the entire ecosystem, they can detect and neutralize new threats quicker than ever before.

  • Secure Boot. Chromebooks are designed with tight software and hardware integration. This allows them to initiate a secure boot process that makes sure none of your Chromebook’s hardware has been tampered with. It still boots up way faster than both Windows and OSX, rarely taking more than 10 seconds depending on your model.

  • Automatic Backup. All files, apps, settings are automatically backed up to Google Drive. You get 100GB Google Drive storage for the first two years included with all Chromebook purchases.

  • Useful for sharing. Unfortunately, many Bitcoin thefts turn out to be committed by friends who often have easy access to your computer and know you own Bitcoin. If a friend wants to use your Chromebook, you click “sign out”, and they sign in with their Google account and all of their data will be downloaded from the cloud. If they don’t have a Google account, they can use the “Guest Mode” feature. Either way, they are completely disconnected from your info and files and would need your password to break the encryption.

It is worth noting that the security of Chromebooks relies on you trusting Google. If you are trying to hide your activity from the US Federal Government, a Chromebook will be ineffective. Google will most likely honor the government's request for information, especially if there is a criminal investigation.

Two Factor Authentication

Two factor authentication is an additional security measure that requires you to enter a one time use number whenever you login to a service. Even if a malicious individual gets access to your password they will still need the code to access your account. You should have this enabled on all of your important accounts, especially your google account. You can have the code delivered to you in three different ways.

  • Text Message. This is the most basic type of two factor authentication, and is the easiest to implement but the least secure. The service sends you a text message with a one time use code whenever you attempt to sign in. You then enter the code when prompted during the login process. Text messages are unencrypted during transit and cell phone numbers can be spoofed, both vulnerabilities enable the interception of codes. That being said, its better to have text message based two factor authentication than nothing.

  • Using a Smartphone App. You can use either Google’s app or an app called Authy to deliver your two factor authentication codes. You sync them with the service when you first set it up using a QR code. They then use a formula based on time to present you with codes, regardless if you have internet reception. Since it doesn’t need an internet connection, you can install the app on an old phone that doesn’t have a cellphone plan/internet connection for added security.

Smartphone


  • Dedicated Device. This is the method that many banks and corporations use. You are issued a dedicated device with a small screen on it. The screen displays a number. When you sign in you enter the code shown on the screen.

TOTPDevice


For those looking for a more in-depth overview of ChromeOS security, you can find their technical overiview here.

Further Reading:

A Chromebook offers Defensive Computing when traveling

How a Chromebook is Locked Down to Protect You


Disclaimer: This guide is intended solely to provide information. As I have no knowledge of individual circumstances and technical level, readers are expected to complete their own due diligence before proceeding with anything mentioned in this article. The topics discussed in this post are advanced and readers proceed at their own risk. Readers are expected to complete their own due diligence before purchasing or selling anything mentioned or recommended.