Addison Cameron-Huff, Blockchain Lawyer

Thoughts and opinions of a Toronto-based cryptocurrency lawyer who's worked in the industry since 2014.

Search This Blog By Keyword

MintChip Halted, Business to be Sold by Mint

MintChip, the Royal Mint's digital currency solution, will be sold by the Mint according to the Wall Street Journal. Development has been halted.

I assume this decision was taken after looking at their competitor: Bitcoin. The Mint could easily make their own version of Bitcoin/Litecoin and launch their own cryptocurrency for about $200 right now.

Read the rest of this post

FINTRAC Will Regulate "Virtual Currencies" in Canada

The federal government's budget act for 2014 passed "first reading" on Friday. It will amend the money laundering regime to create a new category of money services business: "dealing in virtual currencies".

The budget is a whopper of an omnibus bill but the key amendment is at s. 256(2). It adds to the existing categories of regulated businesses (e.g. foreign exchange): "dealing in virtual currencies, as defined in the regulations". I expect the regulations to set a limit of somewhere between $1000 to $3000 for dealing without collecting identity documents.

Read the rest of this post

Being a Lawyer Who Accepts Bitcoin

According to I'm the only lawyer in Toronto who accepts bitcoin.

Read the rest of this post

Easy Backup Script for a MySQL DB

Are you backing up your MySQL database regularly?

Here's how to easily backup a MySQL database:

Read the rest of this post

Bitcoin Lawyers of Canada

I think it might be useful to form a group for lawyers who have particular expertise in the area of Bitcoin. Maybe "Canadian Bitcoin Lawyers" or maybe the "North American Bitcoin Lawyers Group".

If this sounds like something you'd like to be a part of please send me an email at

Read the rest of this post

9 Reasons Why You Should Care About Bitcoin

1. Every eight minutes someone receives ("mines") 25 Bitcoins (worth more than $10k)

2. The Bitcoin network is many times faster than the world's top 500 supercomputers put together

Read the rest of this post

Two Good Articles on How Bitcoin Works

Here's a good technical article on how the Bitcoin protocol works:

This is a follow-up by the same author on how mining works:

Read the rest of this post

How Much Power Does Bitcoin Use?

Forbes reported $15 million per day in power consumption for the entire Bitcoin network back in January but some people disagree with that estimate.

I think a fair estimate of Bitcoin power consumption is about $150,000 per day.

Read the rest of this post

Useful Analytics

I don't find Google Analytics to be very insightful. A big disadvantage is that it's mostly not real-time so you lose out on time-sensitive opportunities/insights.

There is probably a nice analytics service I could buy but it's also fun to roll your own software. The screenshot below shows my personal logging system (click for a better image).

Read the rest of this post

Waivers That Make Sense

I recently drafted a liability waiver. The waiver clearly stated why - in the first paragraph - there is a risk of loss.

This doesn't sound very ground-breaking but I wish more lawyers drafted contracts that clearly state why the legal language to follow is necessary. What is the object of the contract? Too few contracts have appropriate recitals/explanations of risk in plain language.

Read the rest of this post

Come Learn About Bitcoin: Every Wednesday at 7pm

Come learn about Bitcoin every Wednesday night at 7pm: 64 Spadina Ave, Toronto.

The event is held at Bitcoin Decentral, the main space in Toronto for this growing industry.

Read the rest of this post

Why Google Can't Build A Case Law Search Engine in Ontario

There are only three companies that are allowed to make case law search engines in Ontario and Google isn't one of them.

The decisions of Ontario courts are public information but there are only three organizations that you can get them from and none of them provide bulk access. That last part is the key because that's what a truly public system would have: the ability for anyone to access Ontario's cases and make use of them how they would like (e.g. building a better search engine).

Read the rest of this post

Guarding Against Ex-Filtration

The New York Times reported over the weekend that Snowden used a web crawler to spider the NSA's internal sites and steal documents. This is a good example of an organization that didn't have appropriate controls over the velocity of access that was permitted and a great follow-up to my post from a couple weeks ago.

In lighter news, the NYT was mocked over their use of scare quotes by Marc Andreesen and others. It may not be the best story but it does highlight an important point for lawyers: don't let any user download all of your files.

Read the rest of this post

Interviewed by Global TV

I was interviewed by Global TV last week on the topic of CSEC's airport wifi spying experiment.

You can watch the interview here (at approximately 1:50). I did an approximately 15 minute interview but unfortunately only a few seconds made it into this three minute segment. There's a lot more to say on the topic!

Read the rest of this post

How is CSEC Spying on Canadians?

The Communications Security Establishment of Canada (CSEC), the Canadian version of the NSA tasked with spying on foreigners, has been revealed by Snowden to be busy spying on Canadians too. But what has CSEC been doing?

A redacted version of the PowerPoint presentation that CSEC delivered can be found here. It's difficult to tell what CSEC is doing because the PowerPoint is at a fairly level. This blog post has my initial speculations.

Read the rest of this post

Presentation on Cybercrime & Law Firms

I just presented at Campbell House in Toronto with George Takach, Mark Hayes and Alex Cameron on the topic of Cybercrime and Law Firms. I learned a lot from the other speakers about privacy, data breach notification and client-led security. You can buy access to the presentations here.

My slides for the presentation are below. The zip file has the slide notes and slides in PPT/PDF format. If you have any questions about the material please feel free to email me at

Read the rest of this post

Sources for Cybercrime Presentation

I'll be presenting tomorrow on the topic of Cybercrime and Law Firms. Here are a few of the sources that I used for the presentation (some of which didn't make it into the final cut):

Small firms having their online banking accounts cleaned out:

Read the rest of this post

A Virtue of Static Websites: Security

A static website is one in which all of the content is pre-generated. This blog is a good example of that because all of the HTML files are built locally and then uploaded to the server (using RSync).

The usual way that websites work is by having a content management system that generates pages on the fly (e.g. Wordpress, FlatLaw). Although there are a lot of factors that go into choosing a dynamic vs. static website, an important advantage for a static site is security.

Read the rest of this post

Making An Unread Email Button in Gmail

So far as I know, Gmail doesn't have a button to show you just your unread emails. I receive a lot of mail and I'm tired of writing in the search box "in:unread in:inbox".

So today I wrote a quick Chrome extension that injects an unread email button into Gmail. Could I have found an extension somewhere that does this? Probably, but I like to know what code is interacting with my emails. You can review the very short source code for this extension by downloading it below and reading the "run.js" file.

Read the rest of this post

LawPRO on Passwords

The most recent edition of Law Pro Magazine has some good tips on the use of passwords.

One good tip that isn't in the article is to use a base password that you modify for each website/service. I have a couple patterns that I modify by using letters from the domain that the password is for (e.g. the password for eBay would be "PasswordEba", and for Gmail it would be "PasswordGma"). This technique can help avoid the risk of your password being stolen from one site and applied to all of your other accounts.

Read the rest of this post
There are hundreds more blog posts to read, going back to 2013:
Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 Page 14 Page 15 Page 16