Home » Articles (page 5)


TokenCard: One card to rule them all

Ethereum, as a cryptocurrency platform, has been growing at an astonishing rate. With a market cap valuation of over $8 billion, it currently holds the 3rd largest cryptocurrency position, second only to Bitcoin and Ripple. However, Ethereum was developed not as a cryptocurrency. It was a smart contract platform that allows users to develop and deploy dApps and smart contracts. ... Read More »

Blockstack – A Blockchain Based Trust-to-Trust Internet Architecture

The internet’s initial design, which relied on the end-to-end framework principle, led to mobilization of program specific logic and complexity to the peripheral parts of the network, while keeping the network’s center focusing on the simple task of delivery of data. Nevertheless, the originally proposed end-to-end principle did not offer sufficient levels of trust and security. There are multiple central ... Read More »

Three More Reasons to Keep JavaScript off in Tor

Dr. Neal Krawetz, self-proclaimed security specialist and forensic researcher, took to his personal blog to publicize three low-level vulnerabilities in the Tor browser bundle. Upon first read of that sentence, one might wonder why Dr. Krawetz used his personal blog instead of the proper channels. That, it seemed, was a majorly frustrating element for the researcher: that “official” channels rarely ... Read More »

What CIA does on target’s Local Area Network

Based on Wikileaks Vault 7 leak of CIA tools and documents, we can imagine what a data exfiltration attack to a corporate network by CIA looks like. I’m going to focus on the Local Network activity so let’s say there is already a compromised computer in the LAN that will be used as a pivot to further exploit the target ... Read More »

Altcoins mania – The year of 2017 is the year of altcoins

Since the genesis block was mined on bitcoin’s blockchain, the market capitalization of cryptocurrencies has never witnessed the rate of growth we have been experiencing since the beginning of the year 2017. The gains were sometimes even astronomical e.g. Litecoin’s (LTC), Ethereum’s (ETH) as well as Ripple’s (XRP) price each increased by more than 1000% since the beginning of the ... Read More »

Types of Cyberattacks Hitting the Dark Web – A Research Paper

The dark web represents parts of the internet that only exist on darknets and overlay networks. Special software, such as the Tor browser, and network configurations are required to access various parts of the dark web. Darknets are forms of peer-to-peer (P2P) networks that are operated by individuals as well as public organizations. Tor, I2P and Freenet are the most ... Read More »

Why does Dash have a bad reputation?

*This article is meant to present an unbiased review of Dash (formerly darkcoin) and the facts surrounding it. I do not hold any of the coins mentioned (including Monero) in this article in any quantity.* So you may have seen announcements recently about Monero being introduced in addition to Bitcoin on several darknet markets such as Alphabay. Monero is a ... Read More »

New Ransomware-as-a-Service Arrives, Encrypts Most Files Within Minutes

FrozrLock, the ransomware discovered by the BleepingComputer team with early tips and guidance of security researcher David Montenegro and Avast security research Jakub Kroustek, is a new type of a ransomware-as-a-service tool which began to infect devices and servers since April 16. Although its origin is yet to be disclosed, researchers state the ransomware first started to operate in Russia. ... Read More »

Op-Ed: “Going Dark” is an FBI Lie

In 2009, the FBI publicly introduced the term and initiative “Going Dark,” a reference to a “capability gap” between the Bureau and the public. To this day, the FBI maintains a position of inferiority to users of any type of encryption. Their struggle, as seen in the changes to Rule 41, has taken the form of a fight to legally ... Read More »

Tutorial – How To Run a Full Ethereum Node On Windows

Ethereum is one of the most important blockchains present today, not only because it represents another cryptocurrency, but also because Ethereum is technically a “world computer” that unifies the processing power of the network’s public nodes. Ethereum’s “world computer”, or the Ethereum virtual machine (EVM), can be used by peers across the network to execute smart contracts. Ethereum’s platform was ... Read More »

On the Topic of the DoJ’s Operation Pacifier Acquittal

The Department of Justice’s decision to drop all charges against an Operation Pacifier suspect raised questions across the country—and world for that matter. Many mainstream media outlets found it abhorrent that a would-be sex offender walked free, simply because the FBI classified “some source code.” In the meantime, they neglected the good: that even in a case where guilt was ... Read More »

Generalized Proof-of-Activity (PoA) With a Forking Free Hybrid Consensus

Bitcoin and the blockchain technology in general have attracted considerable attention during the past few years. One of the blockchain main innovations is proof-of-work (PoW) which is relatively inefficient and promotes centralization of computational power; this leads to deviation from the main goal of cryptocurrencies; decentralization. Proof-of-stake (PoS) was later proposed to substitute for PoW. Nevertheless, both of PoW and ... Read More »

Intel chips from last 7 years can be hacked remotely

Before we dwell into this vulnerability, allow me to set the table. Once upon a time, Intel decided to add some hardware to their chips to allow admins to remotely control their servers. So today, Intel chips for server solutions contain “Management Engine” (ME) – a microcontroller inside of a processor. ME works independently to the operating system and it ... Read More »

An Alternative Way of Buying Bitcoin

Bitcoin, despite being decentralized in nature, relies on certain gatekeepers that allow people to enter and exit Bitcoin. We are talking about centralized exchanges which are the most popular way of acquiring Bitcoin. These, however, have proved to be unreliable time and time again. From the infamous Mt. Gox to the most recent Bitfinex hack, users have many reasons to ... Read More »