Category «Blockchain»

Is A Crypto Collapse Inevitable?

Jerry Lawson and Elizabeth Southerland identify technical reasons why the crypto bubble is bursting, including the fact that theoretically unbreakable encryption schemes like those underpinning blockchain have proven to be less than impermeable in practice, as users of Coinbase discovered upon losing fortunes. Attackers go after the weakest link in the chain, usually the way in which the algorithm is implemented. Perhaps more ominous, the emergence of a new class of devices called quantum computers threatens to eat the algorithms that underlie crypto for lunch.

Subjects: Blockchain, Cryptocurrencies, Cryptocurrency, Cybercrime, Cybersecurity, Economy, Financial System, Legal Research

Pete Recommends – Weekly highlights on cyber security issues, November 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Broken Twitter Means Broken Disaster Response; Third-party data brokers give police warrantless access to 250 million devices; House Dems say facial recognition company misrepresented its help to consumers; and Do’s and don’ts of data de-identification.

Subjects: AI, Big Data, Blockchain, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Employment Law, Legal Research, Privacy

Pete Recommends – Weekly highlights on cybersecurity issues – October 15, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Uber Data Breach Conviction Shows Security Execs What Not to Do; Protect your privacy and your phone number with Firefox Relay; Pro-Russian hackers take credit for cyberattacks on U.S. airport; and Google Chrome Is the Least Secure Browser, Report Shows.

Subjects: Blockchain, Cryptocurrency, Cybersecurity, Privacy, Search Engines, Telecommuting, Travel

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

Subjects: Blockchain, Cryptocurrency, Economy, Energy, Financial System, Legal Research, Technology Trends

Policing Reimagined

The thesis of Albert Chang’s paper is the metaverse presents a unique opportunity for effective police reforms. Developers, data scientists, and legal sector experts working within the metaverse may be able to implement changes more efficiently than Congress as they are not subject to constitutional constraints. Chang advocates a position that the federal government should strongly consider the adoption of immersive technology to demonstrate that a more effective method of policing is possible. This paper is especially significant in light of the fact that last week Congress passed the CHIPS and Science Act which will bolster research with $290 billion in new funding.

Subjects: Blockchain, Constitutional Law, Criminal Law, Cryptocurrencies, Education, Health, Human Rights, Legal Research, Social Media, Technology Trends, United States Law

Pete Recommends – Weekly highlights on cyber security issues, July 16, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Should we be worried about real-time facial recognition systems?; Some VPNs can’t be trusted. These are best at privacy and security; In a Post-Roe World, the Future of Digital Privacy Looks Even Grimmer; and Here’s how North Korean operatives are trying to infiltrate US crypto firms.

Subjects: AI, Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, E-Discovery, Email Security, Healthcare, Legal Research, Privacy, Search Engines, United States Law

Pete Recommends – Weekly highlights on cyber security issues, June 4, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Face Search Engine Anyone Can Use Is Alarmingly Accurate; Cybercriminals target metaverse investors with phishing scams; Tech Experts Urge Congress to Fight Crypto Influence; and Cybersecurity Initiative to Give Consumers New Digital Security Tools.

Subjects: Blockchain, Cryptocurrencies, Cybercrime, Cybersecurity, Privacy, Search Engines, Search Strategies, Spyware

Pete Recommends – Weekly highlights on cyber security issues, May 8, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Supreme Court privacy vs. your right to privacy; NIST updates guidance for defending against supply-chain attacks; SafeGraph Will Stop Selling Planned Parenthood Location Data; and Be Smart. Shop Safe. We created this guide to help you shop for safe, secure connected products.

Subjects: Big Data, Blockchain, Courts & Technology, Criminal Law, Cybercrime, Cybersecurity, E-Commerce, Healthcare, Intellectual Property, Privacy

Pete Recommends – Weekly highlights on cyber security issues, April 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Amazon Workers Can Now Keep Cell Phones at Work; Best Reverse Image Search Tool: Google, Bing, Pixsy, Tineye; Google adds more ways to remove yourself from Search results; and Shut Stalkers Out of Your Tech.

Subjects: Blockchain, Civil Liberties, Communications, Cybersecurity, Economy, Privacy, Reference Resources, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues, April 9, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Blockchain can power up government processes, GAO says; How QR codes work and what makes them dangerous – a computer scientist explains; Thieves hit on a new scam: Synthetic identity fraud; and Report: One in four employees who made security mistakes lost their job.

Subjects: AI, Blockchain, Cybercrime, Cybersecurity, Economy, Financial System, Healthcare, Legal Research, Privacy, Search Engines