Blog
A Critical View of Bitcoin’s Ideological Foundations
Bitcoin’s ideological roots are grounded in a blend of libertarianism, anti-authoritarianism, Austrian economics, and cypherpunk thought. Its core philosophy is centered around decentralization, individual freedom, and skepticism toward centralized systems of control, especially government and financial institutions. As such, Bitcoin is often viewed as both a technological innovation and a political statement against traditional power structures.
While I am a fan of Bitcoin and its potential to reshape global finance, it is important to engage critically with the project, addressing its contradictions. Bitcoin’s promise of decentralization and empowerment is not immune to the risk of perpetuating inequalities, centralizing power, and reproducing structures it claims to disrupt. Thoughtful critique is not only a means of grappling with these issues but also a vital process for its evolution. On political level Bitcoin, like any social movement, is susceptible to groupthink, and it must embrace critique from diverse perspectives to avoid dogmatism. By confronting its contradictions head-on, Bitcoin can grow stronger and remain aligned with its foundational vision.
Verifying Multisig xpubs on Bitbox and Trezor Hardware Wallets
Multi-signature (multisig) refers to requiring multiple keys to authorize a Bitcoin transaction. Whilst a multisig setup can offer substantial security benefits it also comes with certain risks. As documented in a Bitbox post back in 2020, most hardware wallet (HW) multisig setups can be pretty insecure. In particular, that post rightly pointed out the difficulties at that time with verifying the extended public key (xpub) of certain HWs.
Configuring Policies in Microsoft Defender External Attack Surface Management (MDEASM) via API
This is a brief post explaining how to configure policies in Microsoft Defender External Attack Surface Management (MDEASM) through its API. Although the policies functionality has been available in MDEASM for some time, the process for configuring them via the API has, unfortunately, not yet been documented.
Analysing Formbook Malware
I was recently alerted to an email containing an attachment named 3D PICTURE DRAWING DESIGN.pdf (SHA-256: 6657978de693874ef0b1d7491ff7ecc4066631d88b1481b19d9913d56356fd81). When opened the pdf tries to trick the user into clicking on an embedded link that leads to hxxps://filebin.net/v84mk8ucvp2m702e/3D_PICTURE_DRAWING.pif
Transferring a Large File to a Target Server Using Azure DevOps, CyberArk, and Ansible
I recently needed to drop a large file onto a target Linux server where direct SCP was prohibited. The server is entirely managed using Ansible playbooks in Azure DevOps with it’s credentials stored in CyberArk. Ok no problem…maybe?
From Deployment to Defense: How to Set Up Microsoft Defender External Attack Surface Management (MDEASM) using Terraform and Azure DevOps
Microsoft Defender External Attack Surface Management (MDEASM) is an Azure based security service that helps organizations gain visibility and manage their external attack surface. I was recently presented with the challenge of having to deploy and configure this resource entirely through code using Azure DevOps. What follows are some hopefully useful notes on how I managed to do this.