Recent Posts From All Categories

Political Parties Still Have Cybersecurity Hygiene Problems

Three years after the DNC hack, a new report finds that political parties...

We Are Tenants on Our Own Devices

It’s time to assert our sovereignty over our own...

Everyone’s Talking About Security Tokens But No One’s Trading Them

There’s a party happening right now and everyone’s invited. The...

  • Cryptocurrency
  • Open Source
  • Torrent

Everyone’s Talking About Security Tokens But No One’s Trading Them

There’s a party happening right now and everyone’s invited. The...

Developer Creates Interwallet Transfer Plugin to Strengthen Bitcoin Cash Privacy

The Bitcoin Cash (BCH) protocol and infrastructure continue to see...

Bitcoin.com’s Market Cap Aggregator Adds More Informative Crypto Data

A little over a year ago, our web portal launched a new market cap...

Set up a static network connection in Linux

Configuring a network connection from a Linux machine can be challenging....

Getting started with Source-to-Image for building container images

Source-to-Image is an excellent tool for building container images for...

Turning destructive arguments into productive dialog

I loved having debates with my uncle. We’d debate a wide range of...

How Game of Thrones Made Piracy History

Traditionally, the Game of Thrones season finale is among the most viewed...

Italian Version of Article 17 Requires LEGAL Content to Be Filtered Out

After years of work, on March 26, 2019 the new EU Copyright Directive was...

Top 10 Most Pirated Movies of The Week on BitTorrent – 05/20/19

This week we have three newcomers in our chart. Shazam! is the most...