Home » Articles

Articles

What is a User Activated Soft Fork?

We’re at crosspoint in the Bitcoin journey, where it is up to members of the community to decide what Bitcoin will become and how it will adapt to its growing user base. In the future, we’ll probably look back at this as another page in a long history book and be proud to have been part of this technological revolution. ... Read More »

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, there are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

Botnets for Discovering and Monitoring Terrorism Related Content on the Dark Web

The recent global epidemic of terrorist attacks has revealed how terrorists are not only utilizing the surface web, but also the dark web for building and establishing their networks. To counteract this, Law Enforcement Agencies (LEAs) need efficient and effective means for detection and monitoring of terrorism related content on the internet, in order to prevent the occurrence of terrorist ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

The bitcoin blockchain and truly trusted computing

The idea of “Trusted Computing” is neither new nor complicated and involves code being electronically signed so that it cannot damage your computer. The idea is to “certify” software to avoid it causing the computer to crash or any other negative effects. The practical problems of such technology become obvious if you use either open-source or free software – the ... Read More »

Examining the Bitcoin Address Graph

Bitcoin is by far the most popular unregulated, decentralized cryptocurrency. Since the genesis block was mined, the number of bitcoin users has been rising at a rather exponential rate. While bitcoin’s public ledger offers high levels of transparency, it does not directly reveal the real-world identity of either the senders or receivers of bitcoin transactions. A single bitcoin transaction is ... Read More »

AsicBoost: Scaling Debate Turns into Investigation

The Bitcoin scaling debate is one that has been going on for years and has been constantly evolving as new Bitcoin Improvement Proposals emerge. Most recently, Bitcoin Unlimited and SegWit have been competing for miner approval in order to activate their respective protocol changes. With these two main options on the table, Bitcoin has been split in two factions. Those ... Read More »

Tutorial – Altcoin Flipping : Making Money Online Via Trading Cryptocurrencies

The year of 2017 is definitely the year of crypto, especially that the market capital of cryptocurrencies has reached its all time high during the past week, recording around $28.7 billion according to data from coinmarketcap.com. Many cryptocurrency traders, or more precisely “altcoin flippers”, as myself have made some good profits during the past few weeks. I managed to double ... Read More »

How Companies are Deanonymizing Bitcoin

One of the most common misconceptions regarding Bitcoin is that it is anonymous or untraceable, when in fact this couldn’t be further from the truth. Bitcoin is the opposite of untraceable. All of the transactions that have ever occurred in the network are stored in the immutable and public ledger that is the Blockchain. One could counter with the fact ... Read More »

The Blockchain Technology Is On the Agenda of the Upcoming G20 Summit

It seems that bitcoin, and the blockchain technology in general, will be one of the priorities on next the Group of Twenty (G20) summit’s agenda, which is expected to be held in Hamburg, Germany next July. Along the communiqué, which outlined the priorities of the upcoming G20 summit, the Presidency of the summit stated that the popularization of digital technologies ... Read More »

DAO Casino: Disrupting the gambling industry

As far as history is concerned, humans have always gambled. No matter how far back in time you go, there have always been signs that: where people gathered, people gambled. In those days, people gambled with each other on events. Those were the days of the real peer-to-peer gambling. Then gambling evolved in way to accommodate a third party: the ... Read More »

hybrid.jpg

Hybrid Consensus and Fair Proof-of-Work (fPoW)

Bitcoin’s proof-of-work (PoW) distributed consensus has attracted the attention of bitcoin enthusiasts and those who are interested in the blockchain technology in general. Apart from its brilliant decentralization property, it has a critical limitation when efficiency is considered, as transactions cannot be confirmed in a matter of seconds. During 2016, the hybrid consensus approach was proposed to address this issue, ... Read More »

What is an ICO (Initial Coin Offering)

The cryptocurrency market is often referred to as the “wild west of finance”. Cryptocurrencies can sometimes increase in value several times over. Investment opportunities in the form of crowdfunding campaigns are extremely common in the cryptocurrency sphere. These come in the form of ICOs, short for Initial Coin Offering. Crowdfunding and cryptocurrency is a match made in heaven. Development teams ... Read More »