Home » Tag Archives: overview

Tag Archives: overview

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

An Overview of the Economics of Cryptographic Tokens and Initial Coin Offerings (ICOs)

Blockchain based projects have adopted initial coin offerings (ICOs) as means to simplify the process of raising capital. The cryptographic tokens offered within these ICOs are aimed at fulfilling a myriad of roles across various platforms. Some of these tokens resemble currencies, while others are similar to securities, and others offer features that are completely new. Each startup’s technological strategy ... Read More »

An Overview of Peer-to-peer (P2P) Botnets

A botnet is a network of machines that are infected and controlled by a malicious attacker. Botnets are by far the most serious security threat across the internet today. Even though most botnets rely on a central command and control (C&C) server, peer-to-peer (P2P) botnets have recently emerged as more dangerous forms of botnets. P2P botnets are more resistant to ... Read More »

An Overview Of Smart Contract Scripting For Cryptocurrency Blockchains

The blockchain technology offers secure means for recording information in a distributed, decentralized manner, which opened the door for using it to transfer value via cryptocurrecies. The blockchain technology utilized the concept of “smart contracts” which was coined by Nick Szabo in 1994, aiming at revolutionizing contract law and formal business practices via innovation of electronic commerce protocols between trustless ... Read More »

The Onion Router and the Darkweb – An Overview of Current State and Vulnerabilities

The Onion Project was created to offer an anonymous way to connect to the internet and the darknet essentially through befuddlement. It has established a network that operates to route connection requests in a way that obfuscates users attempting to access surface websites, in addition to enabling users to build websites, on the darknet , whose hosting servers cannot be ... Read More »