Home » Featured (page 2)

Featured

Patent – A System For Exchanging Value Across Various Cryptocurrency Blockchains

Cryptocurrencies can be exchanged within a peer-to-peer environment, without relying on 3rd intermediary parties. Although exchange of value is possible using a single cryptocurrency, exchange of values across various coins’ blockchains is currently not possible without utilization of some sort of an intermediary party, such as cryptocurrency exchanges. To overcome this problem, a patent was introduced proposing an innovative system ... Read More »

Bitcoin news roundup January 15, 2017

This week’s summary of various cryptocurrency news and developments: New developments: New court filing shows Coinbase is ready to fight the IRS The IRS’ attempt to obtain Coinbase’s user records was contested by Jeffrey Berns Esq. The IRS and DOJ wanted to stop Mr. Berns from interfering in the summons, arguing he had no legal basis as reported by Deep ... Read More »

An Overview Of Smart Contract Scripting For Cryptocurrency Blockchains

The blockchain technology offers secure means for recording information in a distributed, decentralized manner, which opened the door for using it to transfer value via cryptocurrecies. The blockchain technology utilized the concept of “smart contracts” which was coined by Nick Szabo in 1994, aiming at revolutionizing contract law and formal business practices via innovation of electronic commerce protocols between trustless ... Read More »

Tutorial: How To Buy From the Valhalla Market?

Today we want to show you how to use the Valhalla Market, also known as Silkkitie. It is one of the oldest markets on the deepweb and has been active since 2013 . Valhalla supports multisig payments, escrow and Finalize Early. Although multisignature payments are supported, the funds in your balance are still held by the market , therefore exit ... Read More »

Petya ransomware

GoldenEye ransomware is sending companies fake job applications

Cybercriminals keep on finding new ways to boost their conversion rates and make a bigger profit at the end of the month. Now, cybersecurity researchers at Check Point tell us about GoldenEye ransomware, a variant of the Petya ransomware that is being used to target companies’ HR departments, as people in these departments regularly need to open files in emails ... Read More »

Ex-UKIP Member Faces Upto 20 Years in Prison For Wire Fraud

In August of 2016, DeepDotWeb reported the UK Independence Party (UKIP) and the European Parliament member Nigel Farage’s aide’s arrest in the midst of boarding a flight to Britain. During that time, former UKIP aide George Cottrell was charged with 21 offences, including money laundering and blackmail. This week, Cottrell plead guilty to wire fraud, settling an agreement with the ... Read More »

signal-header-3928749d381ba96d54fc66a0673114c2.jpg

Signal for Android Updated to Bypass Censorship in Cuba and Oman

Open Whisper Systems (OWS), the group behind the Signal, encrypted messaging app endorsed by Edward Snowden, updated their Android app to circumvent censorship in Cuba and Oman. The circumvention of such Internet blocking is not a new concept—engineers built Tor for the same reasons. Likewise, this is nothing new for OWS either. In Mid-December, they executed a similar method of ... Read More »

Firefox 52 Adds a Tor-Like Font Whitelist to Prevent Fingerprinting through OS Fonts

Researchers from Mozilla scheduled a release for a stable build of Firefox 52—this build’s significance came from a Tor-esque privacy implementation. In the user-submitted bug report, Bug 1121643 from 2015, a user posted that a system’s fonts exposed information about that user. Then, Tor developers, as another user commented, issued a patch to “Bug #13313: Pref ‘font.system.whitelist.’” Tor’s patch to ... Read More »

A new technique utilizing sub-chains to improve bitcoin’s scalability

The scalability of bitcoin is one of the main issues hurdling its mass adoption. Moreover, oephan risk related to the blockchain’s large blocks limits the transactional capacity of bitcoin. A paper published on Ledger Journal has proposed a new technique that utilizes the concept of weak blocks, or functional difficulty blocks, to construct subchains that extend between adjacent real block ... Read More »

TheDealersChoice, a client-side, encrypted Dark Net market

Exit scams are one of the worse problems for any honest deep web user. Even though escrow mechanisms can be employed to protect both the buyer and the seller, these are often centralized and even if they are not they require an arbitrator to determine who wins a dispute. This, along with the prospect of L.E discovering any relevant information ... Read More »

Valencia Police Catch a Darknet Child Pornography Downloader

Agents of the National Police Force (Cuerpo Nacional de Policía) arrested a 34-year-old suspected of owning child pornography in Valencia, Spain. By currently unknown and undocumented means, officers located a computer filled with child pornography. According to the Provincial Police of Valencia, the National Police Force made the taskforce aware “of computer files of sexual content in a computer tower.” ... Read More »

Cryptocurrencies – Financial Systems With The Highest Cybersecurity Standards On The Planet

Cybercrime is increasingly becoming a threat from year to year and its yearly losses have been steadily rising during the past few years. As more and more people are relying on technology and the internet to store wealth and trade (forex, saving accounts, cryptocurrencies, bonds, stock, commodities…etc), cyber-security has become a big concern for individuals, companies and governments. Cryptocurrencies offered ... Read More »

Atomic Verification Via Private Key Locked Bitcoin Transactions

The smart contract technology permits the creation of new protocols that can be implemented on top of bitcoin’s protocol itself. This signals the development of complex scripts, that are far beyond the requirement of a single digital signature. A research paper, which has been published a few days ago, introduced a new concept of private key locked bitcoin transactions, which ... Read More »

SPECTRE delay 3.PNG

SPECTER : A New Scalable and Fast Cryptocurrency Protocol

One of the big issues with bitcoin’s blockchain is the scalability of the protocol which means that the blockchain cannot process a high transaction throughput rate, mainly because the block size has to be kept to a minimum, and their production rate has to be low to guarantee that mining nodes can reach consensus in a secure manner. As of ... Read More »