COINPRICES
TAP
9lwumlv
The Essential Role of Mixing Services: BitMixer Processes 25K BTC per Month

Oidolq6
Bitcoin “Hoarders” are not bad for Bitcoin, they are integral to its success

Nick Szabo: Small-game fallacies
| unenumerated.blogspot.com
Former Silk Road Moderator 'SSBD' tells his side of the story
| allthingsvice.com
New Jersey Settles Case Against Controversial MIT Student Bitcoin Project 'Tidbit' - A product that uses bitcoin mining to generate revenue for website owners
| www.coindesk.com
Bitcoin Trading Platform Bitquick Integrates 'Clef' Phone Based Authentication
| www.bitquick.co
VIDEO: Documentary 'Life on Bitcoin' Trailer Released
| youtube.com
Core Dev Gavin Andresen: Analysis Paralysis (Block Size Limit Discussion)
| gavinandresen.svbtle.com
Xapo Announces Advisory Board with Dee Hock, John Reed and Lawrence H. Summers
| blog.xapo.com
Indonesians Start to Embrace Bitcoin
| blogs.wsj.com
Elliptic Curve Cryptography: a gentle introduction
| andrea.corbellini.name
Bitcoin Might Be The Next Big Thing In The Remittance Market
| techcrunch.com
Payment Processor Payza's Bitcoin Transactions Rise 20% Per Month
| www.coindesk.com
Roger Ver Revealed As Bitcoin.com Owner, In Bitter Dispute With Chinese Bitcoin Exchange OKCoin
| bravenewcoin.com
Neighborhood Pool Watch: May 24th 2015 Network Statistics
| organofcorti.blogspot.com
Neighborhood Pool Watch: May 24th 2015 Block Maker Statistics
| organofcorti.blogspot.com
Neighborhood Pool Watch: May 24th 2015 Mining Pool Statistics
| organofcorti.blogspot.com
California Leaks, Retracts Bitcoin-Friendly Statement
| www.americanbanker.com
BitBeat: Bitcoin Celebrates Its Own Holiday, With Pizza
| blogs.wsj.com
Bitcoin-Based Investment Fund Added to Global Derivatives Trading Platform IG
| www.coindesk.com
Are bigger blocks better for bigger miners? (Block Size Limit Discussion)
| gavinandresen.ninja
California Agency Ends Plans to Regulate Digital Currency
| www.bloomberg.com
User Investigation of BitFinex Hack Using Block Chain Analysis (1459 bitcoin thought to have been stolen)
| www.reddit.com
How Much Profit Is There in Thwarting Financial Innovation? (On BitLicense, the NYDFS, and Superintendent Ben Lawsky)
| www.cato.org
Hong Kong Based Bitcoin Exchange Bitfinex Warns Customers to Halt Deposits After Suspected Hack (99.5% of funds are secure in cold storage according to the company's announcement)
| www.coindesk.com
BitcoinTalk Server Compromised During Social Engineering Attack
| www.coindesk.com
An empirical study of Namecoin and lessons for decentralized namespace design
| freedom-to-tinker.com
P2P Bitcoin Lending Service 'BTCjam' Launches new AutoInvest Feature
| blog.btcjam.com
Australian Bitcoin Company 'digitalBTC' Raises $3.5 million AUD to Launch 'AirPocket' (A Remittance Service for Latin America and the Caribbean)
| bitcoinmagazine.com
BitBeat: Heated Debate Over Software Change Shows Bitcoin’s Governance Challenge
| blogs.wsj.com
Elliptic Strikes Multisig Key Custodian Deal With Gem
| www.coindesk.com
VIDEO: Gavin Andresen | Nathaniel Popper | Andrew Ross Sorkin | Fred Wilson at NY Public Library Event (May 19th, 2015)
| www.nypl.org

A Guide to Basic Password Security & The Danger of Last Pass

A key element of good internet security is having secure passwords that you don't reuse on multiple sites. If you reuse passwords, all it takes is one site to be compromised, and the malicious individual will then have access to all the other sites where you used the same password. Making long secure passwords that are unique can become overwhelming pretty quickly, so I suggest using a password manager that can store all of your passwords and general login info for you.

A lot of people on the internet have been suggesting LastPass as a way to securely store long alpha numeric passwords that are unique to each site they have an account with. Proponents of Lastpass argue that all data is encrypted client side, so Lastpass doesn’t have access to your passwords, but since it isn’t open source there is no way to confirm that.

alt text

With the Lavabit case, it came to our attention that the US government uses secret court orders to compel US based companies to provide backdoors to otherwise secure systems . At the same time they issue gag orders to prevent the exposure of the backdoor to the public. Since Lastpass is a US based company, this is a real possibility, and I strongly suggest not to use them. You are essentially putting all of your eggs(passwords and usernames) in one basket that is easily accessible to the US government and its allies.

As a cryptography and computer security expert, I have never understood the current fuss about the open source software movement. In the cryptography world, we consider open source necessary for good security; we have for decades. Public security is always more secure than proprietary security. It's true for cryptographic algorithms, security protocols, and security source code. For us, open source isn't just a business model; it's smart engineering practice. ------Bruce Schneier, Crypto-Gram 9/15/1990

People who truly value their security and privacy should use KeePassX instead. It is essentially Lastpass but it is open source so the code can be inspected for backdoors by the community. Conveniently, Keepass is included in the Tails live linux operating system, which is a privacy focused OS that is intended to leave no trace on any computer you use it on.

alt text

Last but not least, you should be using two factor authentication on any site that offers it. If you are using the Google Authenticator or Authy smartphone apps for this purpose, make sure that you save a copy of the QR code that is generated when you first setup the 2FA. It will act as a backup just in case you lose your phone. Make sure you keep those QR codes somewhere safe because if someone has access to them they can bypass your 2FA.

Disclaimer: This post is intended solely to provide information. As I have no knowledge of individual circumstances and technical level, readers are expected to complete their own due diligence before proceeding with anything mentioned in this article. The topics discussed in this post are advanced and readers proceed at their own risk.