Nuffnang

Saturday, 23 August 2025

Crypto Wallets Explained: Hot vs. Cold, Passwords vs. Recovery Phrases

Crypto Wallets Explained: Hot vs. Cold, Passwords vs. Recovery Phrases

Crypto Wallets Explained: Hot vs. Cold, Passwords vs. Recovery Phrases - by Mohd Yamani Idna Idris

Introduction

As digital assets continue to gain prominence in global financial systems, the importance of secure storage mechanisms for cryptocurrencies has become increasingly critical. Wallets, whether software-based or hardware-based, serve as the primary interface for users to manage, transfer, and safeguard their holdings. This article clarifies the distinctions between wallet types and explores the implications of key management strategies through practical analogies and real-world scenarios.





Hot Wallets: Convenience Meets Connectivity

Hot wallets such as MetaMask are software-based wallets that reside on a user's phone or computer. They are connected to the internet, making them ideal for trading crypto, interacting with dApps, and managing NFTs.

Analogy: A hot wallet functions like a digital purse. It is convenient for everyday use and easy to access, but if someone gains access to it, they could potentially steal its contents.



Cold Wallets: Security in Isolation

Cold wallets, such as Ledger or Trezor, are hardware devices that store the private key offline. These wallets do not connect to the internet, which significantly reduces the risk of remote attacks.

Analogy: A cold wallet is comparable to a vault located in a secure facility. Even if someone discovers the vault's location, they cannot access its contents without the key.



How Cold Wallets Operate Without Internet Access

Although cold wallets are offline, users can still send cryptocurrency using a process known as offline signing:

  • Connect the hardware wallet to a computer using a USB cable.
  • Use a wallet interface to prepare a transaction.
  • The transaction is signed internally by the device.
  • The signed transaction is broadcasted to the blockchain via the computer.

The private key remains isolated within the device and is never exposed to the internet.



Password versus Recovery Phrase: Understanding the Hierarchy

The password is a local access credential used to unlock the wallet application or hardware device. The recovery phrase, also known as a seed phrase, is the master key that enables full restoration of the wallet.

Analogy: The password is the padlock on your wallet. The recovery phrase is the treasure map that allows the wallet to be reconstructed on any compatible device.



Real-World Scenario

Consider a situation in which a Ledger Nano device becomes damaged. The user can purchase a new Ledger device, select the option to restore from a recovery phrase, and enter the original 24-word phrase. This process restores the wallet, including all assets and addresses.



Conclusion

In summary, hot wallets offer convenience but are more vulnerable due to their internet exposure. Cold wallets provide robust protection through offline key storage and controlled transaction signing. Understanding the hierarchical importance of passwords and recovery phrases is essential for effective wallet management. As the adoption of digital assets expands, a foundational grasp of these principles will be indispensable for both casual users and institutional participants seeking to safeguard their holdings.

Wednesday, 20 August 2025

The World of Artificial Intelligence

The World of Artificial Intelligence

The World of Artificial Intelligence - by Mohd Yamani Idna Idris

AI is not a single technology, but a constellation of interconnected fields. Explore the key areas that define this transformative force.

An Interactive Map of AI

This visualization shows the different domains of AI. Bubble size represents how foundational the concept is. Hover over a bubble to see its name, and use the filters below to explore each category in more detail.

The Core Pillars of AI

These are the foundational areas that drive AI's primary capabilities. They represent the fundamental concepts and techniques upon which more specialized applications are built.

Supporting Technologies

AI rarely works in isolation. These technologies are crucial for applying core AI concepts to real-world problems, expanding its reach and usability across various platforms and devices.

Emerging Fields Pushing Boundaries

As AI evolves, new areas of research and development are emerging. These fields focus on making AI more transparent, efficient, ethical, and collaborative for the future.

AI Taxonomy

AI Taxonomy

AI Taxonomy - by Mohd Yamani Idna Idris

An overview of the different fields and concepts within Artificial Intelligence.

AI Hierarchy

  • Artificial Intelligence (AI)
    • Machine Learning (ML)
      • Supervised Learning
      • Unsupervised Learning
      • Reinforcement Learning
      • Deep Learning
        • Generative AI
          • Transformer
            • Large Language Model (LLM)
    • Rule-Based Systems

Machine Learning (ML)

A field of AI where systems learn from data to make predictions or decisions without being explicitly programmed. ML is often considered the foundation of modern AI.

Supervised Learning

Models learn from labeled training data, where the desired output is already known.

  • Examples: Linear Regression, Logistic Regression, Support Vector Machines (SVM), Decision Trees.
  • Use Cases: Spam classification in email, predicting house prices, image classification.

Unsupervised Learning

Models discover patterns and structures in unlabeled data without a known output.

  • Examples: K-Means Clustering, Principal Component Analysis (PCA).
  • Use Cases: Customer segmentation, fraud detection, social network analysis.

Reinforcement Learning

An agent learns to make decisions by receiving rewards for good actions and penalties for bad ones.

  • Examples: Q-Learning, Deep Q-Networks (DQN).
  • Use Cases: AI for playing games (e.g., AlphaGo), robotics, optimizing resource management.

Deep Learning

A subset of Machine Learning that uses artificial neural networks with multiple layers to model high-level abstractions in data.

  • Examples: Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs).
  • Use Cases: Image and video recognition, natural language processing (NLP), speech recognition.

Generative AI

Models that can generate new and original content, such as text, images, music, or code.

  • Examples: Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs).
  • Use Cases: Creating realistic art and images, text generation, designing new molecules.

Rule-Based Systems

AI systems that use a predefined set of "if-then" rules to reason and make decisions. They do not learn from data.

  • Examples: Expert Systems, decision trees with hard-coded logic.
  • Use Cases: Simple chatbots, medical diagnosis systems, tax filing software.

Transformer

A powerful neural network architecture, central to many modern AI models, that uses a mechanism called "attention" to weigh the importance of different parts of the input data.

  • Examples: GPT (Generative Pre-trained Transformer), BERT (Bidirectional Encoder Representations from Transformers).
  • Use Cases: Machine translation, text summarization, question answering.

Large Language Model (LLM)

A type of Transformer model trained on a massive amount of text data to understand and generate human-like language.

  • Examples: GPT-4, Gemini, Claude.
  • Use Cases: Conversational AI (chatbots), content creation, code generation, creative writing.

Blockchain: A guide to decentralized technology

Blockchain Technology Explained

Blockchain: A guide to decentralized technology - by Mohd Yamani Idna Idris

Deconstructing Blockchain

A visual guide to the decentralized technology revolutionizing digital trust and transparency.

What is a Blockchain?

Blockchain is a decentralized, digital ledger. Think of it as a shared, unchangeable record of transactions that's distributed across many computers, rather than being stored in one central location. This structure removes the need for a central authority, creating a system built on collective trust and cryptographic security.

Distributed Ledger

The ledger is duplicated and distributed across a network of computers, called "nodes." This decentralization means there is no single point of failure, making the system incredibly resilient and robust against attacks or outages.

Immutable Records

Once a block of data is added to the chain, it cannot be altered. Each block is cryptographically linked to the one before it with a "hash." Changing a block would change its hash, breaking the chain and being immediately rejected by the network.

🔗

Hash: A1B2

🔗

Hash: C3D4

🔗

Hash: E5F6

Transparency & Security

All participants can see the transactions, ensuring transparency. However, participants' identities are protected by cryptographic addresses. This creates a system where actions are visible, but privacy is maintained.

How a Transaction Works

1.

Transaction Created

A request for a transaction is initiated and broadcast to the network.

2.

Network Verification

Nodes on the network validate the transaction using consensus algorithms.

3.

Block Formation

The verified transaction is bundled with others to create a new block.

4.

Chain Addition

The new block is cryptographically added to the existing chain, creating a permanent record.

Infographic created to visualize the core concepts of Blockchain technology.

The AI Taxonomy Tree

The AI Taxonomy Tree - by Mohd Yamani Idna Idris

Artificial Intelligence (AI)
├── Symbolic AI (Rule-Based Systems)
├── Statistical AI
│   └── Machine Learning (ML)
│       ├── Supervised Learning
│       ├── Unsupervised Learning
│       └── Reinforcement Learning
│           └── Deep Learning (DL)
│               ├── MLP, CNN, RNN
│               └── Transformers
│                   └── Large Language Models (LLMs)
│                       └── Generative AI
│                           ├── Text
│                           ├── Image
│                           ├── Audio
│                           └── Multimodal
  

AI Cheat Sheet: Algorithms, Types, Use Cases & Notes

Algorithm / Model Type Use Case Notes
Rule-Based SystemsSymbolic AIExpert systems, diagnosticsNo learning; logic-driven
Decision TreesSupervised MLClassification, regressionEasy to interpret
SVMSupervised MLImage/text classificationHigh-dimensional data
k-NNSupervised MLPattern recognitionSimple, slow on large data
Linear RegressionSupervised MLPredict continuous valuesAssumes linearity
k-MeansUnsupervised MLCustomer segmentationRequires k upfront
PCAUnsupervised MLDimensionality reductionImproves speed, loses detail
Q-LearningReinforcement LearningGame AI, roboticsLearns via rewards
Policy GradientReinforcement LearningContinuous controlDirect policy optimization
MLPDeep LearningGeneral predictionBasic neural net
CNNDeep LearningImage recognitionSpatial feature extraction
RNNDeep LearningSequence modelingStruggles with long-term memory
LSTM / GRUDeep LearningLong-term dependenciesBetter memory handling
TransformerDeep LearningNLP, vision, multimodal tasksScalable, parallelizable
BERTTransformer (LLM)Text classification, Q&ABidirectional context
GPT (e.g., GPT-4)Transformer (LLM)Text generation, chatbotsAutoregressive model
Stable DiffusionGenerative AIImage synthesisNoise-to-image pipeline
GANGenerative AIImage, video, music generationAdversarial training
Jukebox / AudioLMGenerative AIMusic and audio creationTrained on waveforms
CLIPMultimodal AIText-to-image searchConnects vision + language
Gemini / GPT-4 VisionMultimodal LLMImage + text understandingCombines modalities

Thursday, 4 April 2024

Google PhD Fellowship Southeast Asia 2024

Google PhD Fellowship Southeast Asia 2024: The Google PhD Fellowship Program aims to recognize outstanding graduate students doing exceptional and innovative research in areas relevant to computer science and related fields. Fellowships support promising PhD candidates of all backgrounds who seek to influence the future of technology.Please click here to apply and visit here to find more details about Google PhD Fellowships Southeast Asia 2024, application process and eligibility criteria. Applications close on May 8, 2024.

Wednesday, 22 February 2023

Google PhD Fellowship Southeast Asia 2023:


Google PhD Fellowship Southeast Asia 2023
: The Google PhD Fellowship Program aims to recognize outstanding graduate students doing exceptional and innovative research in areas relevant to computer science and related fields. Fellowships support promising PhD candidates of all backgrounds who seek to influence the future of technology.


Please click here to apply and visit here to find more details about Google PhD Fellowships Southeast Asia 2023, application process and eligibility criteria.