Published inCryptoStars·Feb 7, 2022NFTs, Web3, and The Blockchain Have Their Place…MaybeIf you manage to push the hype to the side for a minute, you might be able to glimpse the start of a useful set of technologies. The negative blowback hitting NFTs and this space right now (and rightfully so) is often due to a combination of misunderstand the technology…Nft3 min readNft3 min read
Feb 6, 2022Hype & Money Are Testing The Idea of NFTsNFTs continue to pop up everywhere. There’s a lot of hype around them and a lot of money is involved in the NFT and Web3 ecosystem. Technologies Mature Believe it or not, the hype part is a common pattern for technologies. …Nft2 min readNft2 min read
Feb 5, 2022Why Multi-Factor Authentication Is Critical To Stopping Hackers From Getting Into Your AccountsA recent study from Microsoft showed that only 22% of the Azure Active Directory customers are using multi-factor authentication. That’s a much better result than Twitter, which after a major push had 2.3% of their accounts enable this feature. What Is Multi-Factor Authentication? Authentication is the term the security community uses to to verify…Authentication2 min readAuthentication2 min read
Published inCryptoStars·Feb 3, 2022What Is A Bug Bounty And Why Are They Important?Cybersecurity research has a long and interesting history. The dynamics between researchers, mischief makers, hackers, and companies is complex to say the least. Reputation & Security Posture Understandably, companies don’t want to look bad. Most spend huge swathes of their budget on marketing and positioning themselves in a positive light. Having security holes exposed…Cybersecurity2 min readCybersecurity2 min read
Feb 3, 2022A 326 Million Dollar Smart Contract BugAnother hack. Another setback for Web3. Another code quality issue costs millions. What Happened Wormhole is a service that helps you move value from one blockchain to another. So if you want to take 1 SOL from the Solana blockchain to the Ethereum blockchain, Wormhole will help make that happen. The way…Nft2 min readNft2 min read
Feb 1, 2022Why Do Amazon S3 Data Breaches Keep Happening?3TB of data involving airport staff across Colombia and Peru was exposed to anyone on the internet. The report called out an “unsecured AWS server” as the source of the breach. Digging a little deeper, we find that the data was stored in Amazon S3, not an unsecured AWS server. …Cybersecurity2 min readCybersecurity2 min read
Jan 31, 2022Can You Own A Colour? Can You Try?The deeper I dive into the world of Web3, NFTs, and the blockchain, the more I’m fascinating. This is a compelling confluence of technology, communities, grifts, and possibilities. Color.museum came across my Twitter feed recently. …Web32 min readWeb32 min read
Jan 30, 2022The Number One Problem With Web3 Smart ContractsThe concept of a smart contract is exciting. It’s a program that runs on the blockchain executing the terms of an agreement. Unlike physical contracts, the code in the smart contract is much clearer. In a physical contract, language can have unintended consequences. …Cryptocurrency2 min readCryptocurrency2 min read
Jan 30, 2022Is A Bug In A Web3 Smart Contract Part of the Contract?An interesting aspect of Web3 is the smart contract. These are simple programs that run on the blockchain when certain conditions are met. For decades, we’ve been creating more and more software and one thing has always held true: there will be bugs. A bug in the code is simply…Web32 min readWeb32 min read
Jan 29, 2022When Is a Hacker Not a Hacker?The word “hacker” gets throw around a lot. Anytime there’s a cybersecurity issue, the malicious actor is labelled a hacker. Most of the time, it’s an accurate label. However, the line can be very blurry very quickly. What Is A Hacker? Hacker originally didn’t refer to a cybercriminal. The word was used as a…Cybersecurity2 min readCybersecurity2 min read