• Using a 3D printer for practical home repair

    Using a 3D printer for practical home repair

    I taught myself 3D modeling so I could print and cast a bracket for my son’s bed out of epoxy. It was a hugely rewarding journey!

  • Demystifying forms of encryption

    Demystifying forms of encryption

    There are three types of encryption every developer should know: symmetric, asymmetric, and envelope (which is a combination of the previous two).

  • Prioritizing time for creativity

    Prioritizing time for creativity

    If you want to be more creative, you need to intentionally prioritize time to practice creativity.

  • End-to-end encrypted secret sharing

    End-to-end encrypted secret sharing

    Secret sharing typically requires a trusted third party to communicate a secret from point A to B. Encrypting those secrets at point A and only allowing point B to decrypt them removes any risk in the transfer.

  • A new tech stack for WordPress

    A new tech stack for WordPress

    A solid blog starts with a solid foundation – in this case WordPress and the tech stack that powers it.

  • Find your voice

    Find your voice

    Successful blogging is all about narratives. Compelling narratives are all about the voice used to tell them. Finding your voice is critical.

  • The Journey to 100k Daily Readers

    In 2022, I make my return to daily public writing. Join me on this journey as we build a tech-focused blog from scratch all the way to 100k daily visitors.

  • Cracking the Uncrackable – Hashtopolis

    In part 5 of our Bitcoin series, we leverage Hashtopolis to distribute a cracking operation across multiple independent machines.

  • Cracking the Uncrackable – Hashing Setup

    If like last week simply guessing a password is insufficient, then you can bring out the big guns. I’m talking about Hashcat, and advanced system that allows you to automate the cracking of passwords using optimized GPU code. Rather than manually guessing one password at a time – or even iterating over one password at […]

  • Cracking the Uncrackable – Password Guessing

    Last week we covered the basics of how Bitcoin keys work and how software like Bitcoin Core can protect a private key with a user-defined password. Assume you’ve set up your wallet, set a password, then left things along for long enough to forget your password. Now Bitcoin has exploded in value and you want […]