Categories
Mastering Development

Why is the e-voting based block chain system criticized and mistrusted?

I am planning to implement an e-voting system based on hyperledger fabric blockchain, however, I came across many criticisms from well-known security experts like Josh Benaloh and others. The problem is I couldn’t find any proof that the e-voting is definitely insecure. In my opinion, I think Blockchain can be considered the best solution compared […]

Categories
Bitcoin Cryptocurrency Mastering Development

Why does my BIP32 implementation throw different results than other web implementations? They also disagree with each other tho

I am implementing bip32 for my wallet as a project to learn Bitcoin. I am following this documentation: https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki Since I am not implementing bip39 yet, I am getting the master private key and code chain from the BIP39 Root Key from this web: https://iancoleman.io/bip39/#english using a random set of words which are: praise vague […]

Categories
Development

Change GNuPG passphrase using a script

I am struggling to change a GnuPG private key passphrase with a script. This is as far as I get: it returns that the process was successful at the end, but it doesn’t change the passphrase. Any other form of options to gpg result in errors and no passphrase change. Anyone have any hints? I’ll […]

Categories
Development

BiometricPrompt not working if it’s called for the second time

I’m using BiometricPrompt from androidx.biometric:biometric:1.0.0-beta02 for the authenticate process. But i face very strange problem. First time i call biometricsPromt.authenticate() everything works fine, the library shows me the screen depending what security method is set(pattern,fingerprint, password and etc…) then the callback is called and everything is good. The problem is when i call biometricsPromt.authenticate() for […]

Categories
Development

iterate on two dictionaries with list as values

I have data regarding to employees punch time clock. Employee can report his starting time by an automated process (by his key card or by finger print), or manually through a simple web form. The problem is that there are employees who accidentally reported time on more than one method The input stream data comes […]