Avatar
Lucas M
75d12141a391994c4062501f155c2e34e41a8c3cf9bef9e4d7d298253458d1e2
I'm the father of two lovely daughters🥰, a New Yorker, a pre-COVID hodler, and an army vet who loves cooking, hunting, guns, and homebrewing. I'm also extremely anti-war and extremely pro-bitcoin. https://habla.news/laeserin/3e693b64 MedSchlr https://geyser.fund/project/medschlr GitCitadel https://geyser.fund/project/gitcitadel

That's a very uninformed reason for using a wallet like Tangem. Not having your coins on an exchange can't make up for lost coins if they ever experiences a data breach. And they certainly won't reimburse you if they ever do experience one.

Not open-source and not Bitcoin only. You're taking an unnecessary risk by placing your trust in them, imho. You should switch to the Jade. Again, they're your coins, your responsibility.

Replying to Avatar curt finch

how can we use Jason #Lowry's ideas about #Bitcoin as a defensive weapon to secure cyberspace?

There is some research and development in the cybersecurity space exploring ideas similar to Jason Lowry's concept, where Bitcoin or blockchain technology is used as a means to secure digital systems. However, the direct implementation of Bitcoin as a cyber-defense mechanism, as Lowry suggests, is less common. Here's an overview of related work and some areas where similar principles are being applied:

1. Proof-of-Work for DDoS Protection

Some cybersecurity researchers and companies are exploring the use of Proof-of-Work (PoW) mechanisms to prevent Distributed Denial of Service (DDoS) attacks. The idea is to require a small computational challenge (or a small Bitcoin transaction) before granting access to a service. This increases the cost of mounting a large-scale attack.

Projects like Hashcash (the precursor to Bitcoin’s PoW) have been used in email systems to deter spam by requiring senders to solve a computational puzzle.

2. API Access and Blockchain Authentication

Blockchain-based access control is an emerging field. Some developers and startups are working on creating APIs and platforms where access is controlled by blockchain transactions or tokens. While most use other blockchain solutions (like Ethereum smart contracts) for access verification, the principle is similar to Lowry’s idea of using Bitcoin for API defense.

Projects like Blockstack (now part of Stacks) and ENS (Ethereum Name Service) provide decentralized access control by linking blockchain identities with web resources, though they use different blockchains rather than Bitcoin.

3. Ransomware Prevention through Blockchain-based Verification

There are ongoing discussions in cybersecurity about leveraging blockchain for verification processes. For example, systems could require a Bitcoin payment as proof of control before allowing critical actions, thus providing a way to secure access that is costly to bypass.

Researchers are exploring blockchain’s immutability and transparency to create tamper-proof logs, access control systems, and data integrity checks.

4. Payment Channels as Access Control

Some developers are exploring the use of Lightning Network payment channels for microtransactions to access APIs or services. The Lightning Network, built on Bitcoin, allows for nearly instant and low-cost transactions. By using payment channels, APIs can grant access only when a payment is detected, which effectively uses Bitcoin as an access control mechanism.

5. Startups and Projects Exploring Blockchain in Cybersecurity

While not directly aligned with Lowry's concept, some startups in the blockchain space are focusing on decentralized authentication and secure data transfer. Companies like Chainlink, Civic, and Blockpass are building tools that leverage blockchain for secure access and identity verification.

Projects like OpenTimestamps use Bitcoin's blockchain to timestamp data, which indirectly supports integrity and authenticity verification.

Notable Gaps:

Despite these developments, the specific implementation of forcing attackers to make Bitcoin transactions as proof of access is not a mainstream cybersecurity practice yet. This is likely because the concept is novel, requires Bitcoin-savvy infrastructure, and needs to strike a balance between usability and security. However, the principles behind it (proof of ownership, costly access, decentralized verification) are gaining traction in various forms within the cybersecurity field.

Next Steps:

If you're interested in exploring or developing this concept further, looking into projects around blockchain-based access control, Proof-of-Work mechanisms for verification, and Lightning Network applications could be a good starting point. Collaborating with blockchain-focused cybersecurity researchers and developers might also lead to more concrete implementations of Lowry's idea.

Are you aware of any other L2 payment systems (that aren't Lightning related) that seem worth looking into?

It's really NOT a good idea to trust wallets that aren't bitcoin only. Many of them have had customer data breaches in the past. I think you should just switch to the Jade. Your coins, your responsibility. Your choice.

👀wish my baby sister luck! She just told me that she's pregnant again! Baby #4! #parenting

I agree, but... how would you go about convincing the general of that?

I bought this one a while back.

Tea Infuser Basket Stainless Steel Tea Strainer Tea Filter With Small Strainer And Lid Tea Diffuser For Loose Tea Superior Brewing Experience (One pack silver) https://a.co/d/4qTRivB

Wait... you guys still wear clothes?!