Home » Articles (page 10)

Articles

Public 1.PNG

A Public Transport Ticketing System That Accepts Bitcoin

In many parts of the world today, public transportation is faced by the problem of seemingly inconvenient ticketing processes. Bitcoin is a decentralized currency that can easily solve such problem. A group of developers from Liverpool University proposed a novel ticketing system for public transportation, which is comprised of an automatic ticketing vending machine that supports bitcoin payments. An essential ... Read More »

Trust Is Risk – Bitcoin Based Reputation System for Online Decentralized Marketplaces

Online marketplaces can be either centralized or decentralized. Ebay is one of the most popular centralized online marketplaces, while OpenBazaar is by far the most popular decentralized online marketplace. Online marketplaces rely, in a way or another, on creating a reputation system for both sellers and buyers, which is a common denominator between centralized and decentralized marketplaces. In most cases, ... Read More »

modular stacking.jpg

Modular Stacking and Bitcoin’s Evolution

Throughout the past few years, bitcoin has offered us a simple, inexpensive and highly secure way for sending payments to anyone, anywhere in the world. Moreover, being open source software, bitcoin is inherently versatile as it is structured in the form of open ended modular stacks whose capabilities are boosted by the functionalities innately provided by the uppermost layers , ... Read More »

How to use Bitmessage (encrypted messaging)

Bitmessage is a peer-to-peer communications protocol that allows users to send encrypted messages to each other and groups. Its fully decentralized model ensures that users don’t have to trust any third party service and its encryption system ensures that users don’t have to resort to complicated tools like PGP. Bitmessage encrypts messages, masks the sender and receiver of messages from ... Read More »

Hallex.PNG

Hallex – A Decentralized Cryptocurrency Exchange Via Ethereum’s Turing-Complete Blockchain

A large number of cryptocurrency exchanges have experienced cyberattacks that led to the loss millions of US Dollars worth of bitcoins and altcoins, during the past 4 years. In most cases, most cryptocurrency exchanges utilize centralized servers, where trading takes place, to store and manage digital assets, which renders them highly valuable targets for hackers. Accordingly, decentralized exchanges represent ideal ... Read More »

Assessment of Legislations Banning Psycho-active Substances On Their Availability on the Deep Web

Psychoactive substances represent drugs that were formulated to mimic the effects of conventional street drugs such as cannabis, ecstasy and cocaine, while remaining legal substances; thus, they were previously called “legal highs”. Psychoactive substances began to appear in UK’s drug scene between 2008 and 2009. These substances fall into one of four main classes: 1. Synthetic cannabinoids: the effects of ... Read More »

Techno-crime.png

Cyber-Crime and Criminal Opportunities Across the Darknet

The recent technological advancements including the ever evolving internet, e-commerce mobile apps, innovative information technologies, social media and big-data predictive analytics have totally transformed the way we live our lives, whether at work or at home. We now communicate with each other via texting; we shop, date and bank online and we can work remotely from the comfort of our ... Read More »

child-pornography.jpg

Are Public Personnel In Turkey Aware of the Child Pornography Problem?

The development of the internet and communications technologies have helped us make almost every aspect of our everyday lives easier, yet we have become more or less dependent on these technologies while also having to deal with their possible negative effects on us. Unluckily, the recent advancements of Tor networks, and other Dark nets, have offered perverts, pedophiles, voyeurs…etc, means ... Read More »

µchain – A New Mutable Blockchain That We All Need!

A group of researchers have recently published a paper that explored the idea of creating mutable proof-of-work (PoW) blockchains. They presented µchain, a novel mutable blockchain, that promotes modification of blockchain’s history. By definition, a blockchain represents an immutable, decentralized data structure that record a chain of events, such as financial transactions in case of a cryptocurrency system. Even though ... Read More »

The Kibbutz Economy and The Blockchain – A Hypothetical Scenario

Kibbutzim is a social experiment that has successfully achieved its pre-set goals during the initial years following establishment of this Israeli collective community. During the later parts of the twentieth century, the altered circumstances have faced Kibbutzims with criticism regarding the goals and functioning style of this social experiment. Nonetheless, Kibbutzims have successfully managed to develop and become one of ... Read More »

Tor anonymizers.jpg

Proactive Response and Detection for TOR (PReDTOR) – A Tool for De-anonymizing Tor Traffic

Tor is a free open source software that enables users to browse the internet anonymously. It utilizes a network of proxy servers from all parts of the world, known as nodes, that route internet connections. Tracing internet traffic sent via Tor represents a daunting task, because it operates via means of encrypted protocols such as HTTPS. Accordingly, determining whether data ... Read More »

Cross Browser Tracking Techniques

Web tracking has been evolving quickly. The first generation tracking technique adopts stateful, server-set identifiers, such as cookies and evercookie. After that, the second-generation tracking technique called fingerprinting emerges, moving from stateful identifiers to stateless— i.e., instead of setting a new identifier, the second-generation technique explores stateless identifiers like plug-in versions and user agent that already exist in browsers. The ... Read More »

MDL.PNG

Research Paper – A Novel Approach For Deep Web Info Extractions

The enormously wide variety of internet resources and the effective features available on various websites of the deep web today, have rendered safe deep internet browsing, while also finding high quality content, a rather hard goal to achieve. Web exploration represents the process of extracting information from different details property offers such as e-trade and other garage area information extracting ... Read More »

hacking and politics.png

Hacking and Politics – Can Hackers Change World Politics?

Researching through Science and Technology Studies STS along with application of the social movement theory, present literature has tried to examine the relationship between hacking and politics. Most authors only present questions without proposing any answers. Most authors resist equating political activism with hacking. Hacking is unique, especially when considering Gabriella Cleman’s phrase “the political agnosticism of hackers” . This ... Read More »