How to OPEN an XRP Wallet

Many new comers to crypto currencies find themselves interested in both XRP and XLM. Both of these coins have a sort of "Spam" protection with their wallets. They both require 20coins to fund the wallet before you can make a deposit to the wallet. Many users are asking how to fund the wallet then. Actually it is quite simple. You will need to own 21 or more of either coin first, so you must pur...

Read More

CoinBase Security Investigation

San Francisco - Coinbase stated 20 December 2017 that it is investigating its backend programmers and site contractors for an unexplained sudden surge in prices for Bitcoin Cash. The day before, teh prices for the coin rose over 33% and then another 41% the next day. Source - https://blog.coinbase.com

My...

Read More

S. Korean Exchange Christmas Hacked and died.

Another fine Exchange was hacked recently. North Korea is being investigated for their part in a Hack of a South Korea Exchange which led to the theft of over 17% of their coins and causing them to go bankrupt overnight. So we have another example of an exchange linking a wallet to a network, thus leaving it open to invasion.

Near 21 December 2017 S. Korean Exchange Youbit was hacked a 2n...

Read More
NiceHash Criminal Background?

NiceHash Criminal Background?

So not too long ago the Platform NiceHash was hacked and many Bitcoins stolen. NiceHash seems to be some kind of mining group. No matter what they are, they were storing people's Bitcoins. So we have a situation where users were using the temporary wallets of NiceHash to keep their coins long term. First mistake.

NiceHash claims that one of the admins had their user credentials stolen....

Read More
Social Hacking

Social Hacking

When talking about your crypto coins and your wallets, Social Hacking is a HUGE weakness. It is basically a statistics game. Social Hacking is the collection of data on a target in order to be able to make an educated guess on the user credentials for a system. In this case, your account login or wallet credentials.

At least 90% of Users have extremely poor and lazy security. We use email addr...

Read More