Home » Author Archives: Tamer Sameeh

Author Archives: Tamer Sameeh

The Blockchain Technology & Antitrust and Competition Law

The popularization of the blockchain technology and cryptocurrencies created an urgent need for the development of regulating legislations that are inspired by a thorough understanding of this innovative technology. The autonomous and decentralized nature of the blockchain technology, and the fact that THE existence of a blockchain is totally independent of any control by federal institutions poses enormous challenges to ... Read More »

Bitcoin Transaction Fees Have Skyrocketed – How To Deal With That?

Bitcoin price has soared during the past few months, which was also associated with a sharp rise in transaction fees. Currently, on average costs around $20 to send a transaction across the bitcoin network. This has forced many businesses and individuals to refrain from using bitcoin, especially that the fees tended to be below $2 a couple of months ago. ... Read More »

Research: Exploring the Regulation System and Market Culture of AlphaBay

Legal marketplaces are governed by federal state law, and market participants hold the right to resort to legal recourse whenever they might be faced with fraudulent behavior. Law enforcement promotes insurance, stability and transparency of commerce taking place across legal markets. Interestingly enough, illegal markets have to somehow emulate the main approaches adopted by legal markets to become successful and ... Read More »

Research: Most Studies that Examined the Structure of Darknet Communities Weren’t Accurate!

Throughout the past decade, the popularity of Darknet usage has been skyrocketing secondary to the public’s concern regarding their privacy and anonymity on the internet. Most research studies delving into the structural features of darknet communities during the past few years, concluded that most activities taking place in various darknet communities are more or less illegal. However, more recently, many ... Read More »

Using Bitcoin Transaction Analysis In Deanonymizing Users of Tor Hidden Services

Anonymity over the world wide web has never been a more critical issue. To achieve bulletproof anonymity, multiple solutions are being currently implemented by internet users all over the world. The most popular of which is the Tor network that represents the busiest anonymous communication network on the internet serving millions of users every day. Tor also enables webmasters to ... Read More »

An Overview of the Current Status of Linux’s Hyperledger Project

The Hyperledger project represents an initiative that was launched by the Linux Foundation in December 2015 to build an open source platform for the development of blockchains. The Hyperledger aims at establishing a proficient ecosystem throughout which coders and entrepreneurs can meet up and collaborate to build blockchains. So, Hyperledger is not a cryptocurrency; instead, it is a specialized hub ... Read More »

Novel Defense Techniques To Secure Tor Communications – A Research Study

The Tor network depends mainly on resources, which are owned and managed by volunteers, to cater daily for millions of internet users seeking to maintain high levels of anonymity and privacy. As such, these resources have to be efficiently managed, by the Tor network, while also dealing with challenges facing its utility and robustness. A large percentage of the challenges ... Read More »

Tor (the myth and reality.PNG

An Overview of Sniper Attacks Against the Tor Network & Current Defenses

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

Utilizing the Blockchain Technology To Combat Global Software Piracy

Since the late 1970s, software piracy has grown into a serious problem negatively affecting software developers and undermining their ability to preserve the copyrights of their digital creations. The past 30 years have witnessed significant advancements in various computing technologies. However, developments and innovations in communications technologies have catalyzed software piracy, via provision of high speed delivery, mobility and portability ... Read More »

algorithmic-improvements-give-bitcoin-mining-a.width-660.jpg

Bitcoin Mining – Is It Still Profitable?

The best answer for this question would be “it all comes down to how much you will invest.” However, to get a more meaningful answer, there are multiple factors to be considered: 1. The price of bitcoin is constantly changing and the volatility is currently extremely high. One bitcoin is currently worth more than $11,000, and less than a month ... Read More »

Can Cryptomarkets Minimize The Harms Associated With Illicit Drug Use?

Cryptomarkets are special forms of online marketplaces that are hosted on the deep web, and feature a large number of vendors. Buyers and vendors on cryptomarkets enjoy the anonymity provided to them by the deep web, as their web locations are concealed and cryptocurrency payments render it almost impossible to track them. Drug trading on various cryptomarkets has recently evolved ... Read More »

Detection of Malicious or Black IP Addresses Via Analysis of Daily Darknet Traffic

The world has recently began to recognize the significance and dangerous impact of various forms of network vulnerabilities. Moreover, cybercriminals can exploit these vulnerabilities to phish sensitive and private information from the machines of vulnerable web users. As such, researchers have recently began to thoroughly study how countermeasures can be created to solve various network vulnerability issues. A recently published ... Read More »

Using a Large Scale Darknet To Identify Botnet Related Activities

The consequences of a wide array of malware programs, which are present today, have led to perilous incidents that induced serious damage not only to users’ assets, but also to the internet’s infrastructure. This is notably the case with botnets, which represent networks of compromised machines that are remotely controlled by botmasters to perform various forms of nefarious activities. By ... Read More »

The SSH Public Key Authentication Protocol Over Tor – How Vulnerable It Is to Timing Attacks?

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »