Customizing the design of a select tag is notoriously difficult. Sometimes its impossible without building your own from scratch using a combination of styled divs with custom JavaScript. In this article you will learn how to build a Vue.js component that can be styled using comp … | Continue reading
When you make a withdrawal at a bank, pay taxes, or get a license you must prove who you are. The process of proving who you are is a very “human” process. The authority checks your ID and ensures the picture looks like you, which allows them to trust that you are the person who’ … | Continue reading
Many newcomers to the Bitcoin and cryptocurrency space are interested in holding their own private keys. As we know, not your keys not your coins. Dangers In order to spend Bitcoins, a user must have access to their wallet or to the seed phrase that was created alongside the wall … | Continue reading
In preparation to add Bitcoin and cryptocurrency key generation in Qvault, one of the features that was just added was “Offline Mode”. There is now a toggle switch at the top of the app that, when switched off, ensures that no network requests can be made by the app. Qvault has a … | Continue reading
Choosing the right dependencies is a difficult task. Assuming the developer of an application is the best programmer in the world, the “best” thing to do would be to write the entire codebase alone. This would eliminate the bugs, vulnerabilities, and malicious intrusions of infer … | Continue reading
One of the first techniques developers learn is the if/else statement. For obvious reasons if/else statements are a primary way to create logic trees, where calculations are handled differently depending on the input variables. However, complex and nested if/else statements becom … | Continue reading
This is a topic that has been talked about quite a bit, but I think it’s an important one to reiterate to our users. Encoding is not Encryption! Encryption is a specific subset of encoding where the encoded messages can only be accessed by authorized parties (the ones holding the … | Continue reading
Qvault’s dual encryption allows users to require that two keys are needed to unlock their vault. A password, and a key card. You have probably heard of two factor authentication. According to Authy: 2FA is an extra layer of security used to make sure that people trying to gain ac … | Continue reading
This is a tutorial on how to setup an Electron app on Travis CI, so that new versions are deployed to Github Releases with a simple pull request. Boilerplate I created a boilerplate repo that has all the necessary configuration to deploy a minimalistic app to Github releases. If … | Continue reading
By Lane Wagner We all have hundreds of online accounts. Ideally, as many of those accounts as possible have unique passwords. Unique passwords however present a difficult problem: No one can remember hundreds of strong passwords. To fix this problem, we created password managers. … | Continue reading