Search
Can you split a private key in half? Understanding crypto ownership in divorce and beyond
8.8.2025
While you can’t literally split a private key, there are secure legal and technical methods to share or divide control of crypto assets during divorce
Can you split a private key in half? Understanding crypto ownership in divorce and beyond
8.8.2025
While you can’t literally split a private key, there are secure legal and technical methods to share or divide control of crypto assets during divorce
Understanding the ASIC v Wallet Ventures Decision on Digital Assets
29.7.2025
On July 24, 2025, the Full Federal Court of Australia issued its decision in ASIC v Wallet Ventures Pty Ltd [2025] FCAFC 93, dismissing the Australian Securities and Investments Commission’s (ASIC) appeal in a closely watched case concerning the regulatory status of crypto-asset products....
Understanding the GENIUS Act: US Stablecoins Revolution
26.7.2025
The Guiding and Establishing National Innovation for U.S. Stablecoins Act—better known as the GENIUS Act—was signed into law on July 18, 2025. It marks a watershed moment in U.S. digital asset policy: the first comprehensive federal framework specifically regulating the issuance and operation...
Getting Clarity on Apple’s Liquid Glass
17.7.2025
Gathered notes on Liquid Glass, Apple’s new design language that was introduced at WWDC 2025. These links are a choice selection of posts and resources that I've found helpful for understanding the context of Liquid Glass, as well as techniques for recreating it in code.
Getting Clarity...
Ring Psychology: Understanding The 6 Phases Of A Wrestling Match Through Heel Era John Cena
26.6.2025
Read more
Understanding What Is a Software Crypto Wallet and Why Choose Ledger?
17.6.2025
This content is provided by a sponsor. With the rise of cryptocurrencies, securing digital assets has become paramount. A crucial component in this process is selecting the right crypto wallet. But what exactly is a software crypto wallet, and how does it differ from other types? What is a crypto...
How $220M was stolen in minutes: Understanding the Cetus DEX exploit on Sui
5.6.2025
The Cetus DEX exploit on Sui drained $220 million in minutes. The hacker took advantage of an undetected bug in the math library of the protocol to siphon off the funds
Cascading Layouts: A Workshop on Resilient CSS Layouts
10.4.2025
If I were starting with CSS today for the very first time, I would first want to spend time understanding writing modes because that’s a great place to wrap your head around direction and document flow. But right after that, …
Cascading Layouts: A Workshop on Resilient CSS Layouts...
Understanding recent credential leaks and the rise of InfoStealer malware
28.3.2025
Opinion by: Jimmy Su, Binance chief security officerThe threat of InfoStealer malware is on the rise, targeting people and organizations across digital finance and far beyond. InfoStealers are a category of malware designed to extract sensitive data from infected devices without the victim’s...
Crypto for Advisors: Memcoins
13.3.2025
Memecoins have gained mainstream visibility recently. However, understanding what they are, how they work and where the risks are is critical
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous
Can the Ethereum blockchain roll back transactions? Understanding the limits and risks
28.2.2025
Ethereum rolling back transactions post-Bybit hack is technically infeasible. It has grown into a vast and complex network, and the repercussions of a rollback would be enormous