Home » Articles

Articles

storytelling.jpg

Utilizing the blockchain technology to create contemporary writing pieces

The digital technology has transformed the way narratives are created and consumed, from simply moving story-worlds and images to complex digital multi-branched and long-form story experiences. Also, the blockchain technology has revolutionized the global financial system. As a globally visible and collaboratively compiled list of transactions, which have been executed within a specific system, the blockchain technology promotes decentralization of ... Read More »

Can Foreign Governments Hack Americans With Impunity?

A lawsuit being heard by the US Court of Appeals for the District of Columbia Circuit seeks to answer the question of whether foreign governments can hack Americans with impunity. In the case of Kidane v. Ethiopia, lawyers for the Electronic Frontier Foundation (EFF) and the law firm of Jones Day and Robins Kaplan are representing a man from Maryland, ... Read More »

Coinspermia 1.PNG

Coinspermia : Unchaining Cryptocurrency

Even though the blockchain technology has introduced the world to a revolutionary concept of digital currencies that can entirely transform the global financial system, the scalability of bitcoin, and many other cryptocurrencies, is hindering mass adoption of the world’s first decentralized currencies. Bitcoin’s proof-of-work (PoW) scheme promotes immutability and consensus formulation; however, it represents a process that consumes enormous time ... Read More »

https://www.tips.at/image/thumb/news/467721/383224/800x800x0/1486039242.5215-die-kriminalitaet-im-darknet-nimmt-auch-im-bezirk-schaerding-zu.jpg

Dark Net Crime In Increase: Interview With Austrian Chief Inspector

There have been numerous dark net-related prosecutions in Europe in the past few months. The first country to wage a war against dark web criminals was Germany, where the government decided to provide more manpower to eliminate all kinds of illegal dark net activity. The Germans started focusing on the dark web shortly after the Münich shooting, which happened on ... Read More »

Tutorial: How To Buy From the Apple Market

Today we’re going to show you how to use the Apple Market. This market is fairly new but has managed to get a great reputation so far. It allows multisignature and traditional ecrow. Balances and traditional escrows are held by the market, so exit scams by the market are possible. The market has a decent variety of products and an ... Read More »

PascalCoin – A New Cryptocurrency Setting a Record For Daily Trade Volume

Right after being enlisted on Poloniex, the cryptocurrency exchange, the price of PascalCoin (PASCAL) soared by more than 1600% within less than 24 hours. The volume of exchange exceeded 7000 bitcoins less than a day after the PASC/BTC market was added to Poloniex. Although the first block on PASCAL’s blockchain was mined last August, PascalCoin didn’t attract much attention until ... Read More »

DRAFT.PNG

DRAFT – Using Financial Derivatives To Secure the Assets of Decentralized Applications (DAPPs)

Ethereum contracts can be formulated to act like decentralized applications, or DAPPs. Numerous DAPPs are already operating including a role playing game, an online marketplace, an internet service provider and a prediction market. Unfortunately, DAPPs are vulnerable to hacking, and the funds they hold can be stolen. The recent attack on a DAPP, known as DAO, has revealed that smart ... Read More »

K-Chain.jpg

K-Chains – Blockchain Protocols Based On Quantum Mechanics

Quantum mechanics have ignited a transformational change in the way we envision the world and utilize technology. Economics is one of the prominent fields throughout which Quantum mechanics can be deployed. Quantum mechanics can be utilized to create a novel class of blockchains. A new paper has just been published exploring the possibilities of building blockchains on the basis of ... Read More »

Bitcoin Legislation and Investigation – A Proposal For the US Law Maker

The advent of bitcoin, and digital currencies in general, unleashed a myriad of problems that emerged from the anonymity associated with cryptocurrency transactions, thus raising concerns related to money laundering. Legislators and law enforcement agencies are currently struggling to mitigate the money laundering issues affiliated with cryptocurrencies and several other digital currencies. In the face of these threats, government agencies ... Read More »

Dandelion.jpg

Dandelion – Turning Bitcoin Into A Fully Anonymous Financial System

Bitcoin, and some other cryptocurrencies, have gained much popularity during the past few years. Even though bitcoin doesn’t promote total anonymity of its users, it is publicly perceived as a privacy preserving digital currency. Technically speaking, cryptocurrencies publish all users’ transactions on public ledgers that can be visible by anyone and this process is a pivotal part of the process ... Read More »

SwingPay 1.PNG

Swing-Pay – One Card for all P2P Payments Using Biometric Authentication

Prelation of payment technologies is increasingly improving the quality of people’s life all across the globe. Emerging innovative payment solutions are creating not only opportunities, but also challenges for the future of the global financial system. Being a swift and convenient payment method, contactless payment technologies are gaining wide acceptance, especially amongst merchants for whom throughput is the most important ... Read More »

Ouroboros – A New Proof-of-Stake (PoS) Blockchain Protocol

Ouroboros is a new proof-of-stake (PoS) blockchain protocol that offers rigorous security measures. The new blockchain protocol establishes security properties that are comparable to those offered by bitcoin’s blockchain protocol. As Ouroboros deploys the PoS concept, it is qualitatively more efficient than blockchain protocols that rely on the proof-of-work (PoW) concept. The creators of Ouroboros showcased the practicality of its ... Read More »

Tor bridges.png

A Security Evaluation of Public and Private Tor Bridges

The Tor network represents a revolutionary network protocol that counteracts surveillance, censorship and internet traffic monitoring, via encryption and concealing patterns of communication by routing internet traffic through multiple onion routers (ORs). The IP addresses of some of the entry ORs, which are known as Tor bridges, are concealed so that it would be rather difficult to block traffic routed ... Read More »

Tutorial: How To Buy From the House of Lions Market?

Welcome to the House of Lions market! Today, we’re going to show you how to enter the market and how to buy an item. The H.O.L market is fairly simple to use as it employs a traditional balance/escrow mechanism. This means that all balances are handled by the market and that the escrow is centralized. So, this simplicity comes at ... Read More »

OSINT 1.png

Open Source Intelligence OSINT and the Dark Web

The dark web, the part of the deep web which is comprised of a number of darknets (e.g. Tor, Freenet, I2P…etc), provides individuals with an anonymous way to connect to the internet and publish information. Although this anonymous atmosphere is used to facilitate communications for legitimate purposes, it is also exploited for transforming information, services and goods for illegal purposes. ... Read More »