menu
Channels
Team
Posts
Members
Info

Hardware Security Module (HSM)

Author: Klaas Hemstra HSM devices are commonly used to secure a private key. Here Klaas describes an approach to use this to generate a private key securely and extract the public key from it verifiably. Document:…

thumbsup
1
message-simple
5

Data donation mockup - sending more than money to the moon

Intro – In my opinion, encrypting data rather than just cryptocurrencies represents the most promising aspect of this project by far. As discussed in my Private key protocol and Most secure way posts, we probably don't want to send a Bitcoin private key. Instead, we should send…

thumbsup
0
message-simple
3

Quantum Key Distribution (QKD)

https://arxiv.org/pdf/1707.00542.pdf

thumbsup
0
message-simple
9

Private key protocol

Quantum key generation - while this is really cool, I know of no way that quantum mechanics could possibly help ensure the general public that the key really is on the surface of the moon and that no copies exist on earth. In most quantum scenarios, Alice and Bob are both…

thumbsup
0
message-simple
4

The most secure way I can think of

1. Contract a payload for delivery to the lunar surface (probably Astrobotic or Moon Express aboard a Rocket Lab Electron or SpaceX Falcon rocket) 2. Get a third-party crypto security firm to audit the payload before launch, verifying for the public that the code and…

thumbsup
0
message-simple
0

Rescope Private Key Problem

I want to pose a discussion regarding the private key problem, and whether or not we want to rescope the topic for the purposes of the hackathon. Plainly we stated our goal to put a bitcoin key that can be physically obtained on the moon. Given enough money, doing just that is…

thumbsup
0
message-simple
9

Private/Public Key Challenge proposal

Hey guys! One of the first challenges that needs to be solved is: How should we securely create the private/public key pair that will hold the crypto bounty? …

thumbsup
0
message-simple
1