(I dunno if application on android can interact or the feasibility of this project: but I'm sure it's a good project.)
Let me know what do you think about that.
If you have more info about it, post them!
I think that especially the information in the second link have to be specified on the Mycelium website.
Or as Pietro says, simply force a backup immediately when creating the insecure single address accounts.
It doesnt matter to me, since the only single address accounts I use are for paper wallets for which I dont store the priv key on my phone anyways. But many people used the program as it was. It seems irresponsible to completely remove the functionality. (Even if it's also irresponsible for the user to keep using that functionality)
Bypassing Antivirus With Ten Lines of Code or (Yet Again) Why Antivirus ...
I had originally set out to write a long winded blog post on different antivirus bypass techniques. I went through what was supposed to be s
My view on the current situation of Bitcoin and the Blockchain - Joi Ito...
In a previous post, I wrote that I believe the Blockchain has the potential to be as disruptive -- and unlock as much opportunity and innova
Video Documentary on German Hyperinflation | The Prudent Investor
The Prudent Investor investigates the problem of the current fiat currency system and observes the global redistribution of wealth. The focu
Five crazy abstractions my Deep Learning word2vec model just did
Seeing is believing. Of course, there is a whole host of Machine Learning techniques available, thanks to the researchers, and to Open Sourc
Blockstream Starts Development on the Lightning Network - Bitcoin Magazine
The authors of the much-discussed Bitcoin Sidechains paper “Enabling Blockchain Innovations with Pegged Sidechains,” released in October, ha
Traity: Reputation Passport - App Android su Google Play
People on eBay are trustworthy when they have many stars. Unfortunately, you can only use your eBay stars within eBay. So who owns your repu
Memory – Part 2: Understanding Process memory | Intersec Tech Talk
From Virtual to Physical. In the previous article, we introduced a way to classify the memory a process reclaimed. We used 4 quadrants using
German researchers discover a flaw that could let anyone listen to your ...
The spying can happen even on cellular networks using the most advanced encryption now available.
GTrendsR package to Explore Google trending for Field Dependent Terms
My friend, Steve Simpson, introduced me to Philippe Massicotte and Dirk Eddelbuettel’s GTrendsR GitHub package this week. It’s a pretty nift
What Would Twitter Do? Musician’s tweets of Sony e-mails lead to threats
"I don't know what the line is," says musician-turned-publisher Val Broeksmit.