Too Long; Didn't Read
The methods discussed in this article are not recommended for short or long term storage of your Bitcoin. This is only for fun. Disclaimer: Anything you do with this knowledge or the provided library is at your own risk. In Part 2 we will discuss how to use the methods discussed here to timestamp our documents to prove their existence without utilizing any centralized third party. In this article, we discuss how we can turn any seemingly arbitrary file into an inconspicuous, mobile unit of wealth. We can even add a passphrase to prevent malicious actors from gaining access to our funds.
Share Your Thoughts