Why Your Data Could Be At Risk Without Decentralized Computing

The start of 2018 brought the news of two major computing vulnerabilities that affect the vast majority of devices on earth. These include smartphones, tablets, laptops, desktops, and most ominously, servers. These vulnerability nightmares also expose the truth that the world’s computing policy needs to be urgently and radically transformed. The world needs to look for…


  1. “A malicious website exploiting these vulnerabilities can, for example, steal the private keys to a Bitcoin wallet stored offline on a desktop computer, which was previously considered impossible.”

    How exactly does that work? I mean, if I have my private keys on an off line computer and compose the spend transaction (tx) on that computer then transfer that tx to an online computer (via CD or whatever) how can my private keys have been exposed online?

    I suspect you mean a wallet stored on a computer that is connected to the internet as apposed to an on line wallet? The answer is simple, don’t connect any device that stores your private keys to the internet nor to any device/network you are not sure of.

Comments are closed.