Category «Cryptocurrency»

Is A Crypto Collapse Inevitable?

Jerry Lawson and Elizabeth Southerland identify technical reasons why the crypto bubble is bursting, including the fact that theoretically unbreakable encryption schemes like those underpinning blockchain have proven to be less than impermeable in practice, as users of Coinbase discovered upon losing fortunes. Attackers go after the weakest link in the chain, usually the way in which the algorithm is implemented. Perhaps more ominous, the emergence of a new class of devices called quantum computers threatens to eat the algorithms that underlie crypto for lunch.

Subjects: Blockchain, Cryptocurrencies, Cryptocurrency, Cybercrime, Cybersecurity, Economy, Financial System, Legal Research

Pete Recommends – Weekly highlights on cyber security issues, May 27, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Essay on the poisoning of LLMs—ChatGPT in particular; Chinese hackers seek capabilities to disrupt communications between US and Asia in event of crisis, Microsoft says; CISA and Partners Update the #StopRansomware Guide; and How To Switch to Using Passkeys With Your Google Accounts.

Subjects: AI, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, Healthcare, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, March 11, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: What to Do When Your Boss Is Spying on You; Biden Administration’s Cybersecurity Strategy Takes Aim at Hackers; Your user data can be the prosecution’s star witness; and Browser Security report reveals major online security threats.

Subjects: AI, Cryptocurrency, Cybercrime, Financial System, Government Resources, Privacy

Pete Recommends – Weekly highlights on cyber security issues, March 4, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Global internet connectivity at risk from climate disasters; The Insecurity of Photo Cropping; These 26 words ‘created the internet.’ Now the Supreme Court may be coming for them; and NSA Releases Best Practices For Securing Your Home Network.

Subjects: AI, Climate Change, Computer Security, Cryptocurrency, Cybercrime, Cybersecurity, Legal Research, Privacy, RSS Newsfeeds

Pete Recommends – Weekly highlights on cyber security issues, February 26, 2023

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: These 26 words ‘created the internet.’ Now the Supreme Court may be coming for them; Global internet connectivity at risk from climate disasters; Zelle fraud claims surge. How can you protect yourself?; and Email security still has a forwarding problem.

Subjects: AI, Communications, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Economy, Email Security, Financial System, Legal Research, Privacy

Inventing the Dark Web

This paper by Thais Sardá, Simone Natale and John Downey examines how the deep Web, i.e., Web sites that are not indexed and thus are not accessible through Web search engines, was described and represented in British newspapers. Through an extensive content analysis conducted on 833 articles about the deep Web published between 2001 and 2017 by six British newspapers, the authors demonstrate that these technologies were predominantly associated with crime, crypto markets and immoral content, while positive uses of this technology, such as protecting privacy and freedom of speech, were largely disregarded. The consistent association by the British press between the deep Web and criminal and antisocial behaviors is exemplary of a recent “apocalyptic turn” in the imaginary of the Web, whereby Web-related technologies are perceived and portrayed in more negative ways within the public sphere. The authors argue that the use of such negative concepts, definitions and associations engender distrust about uses of the deep Web, propagating user stereotypes that reflect what the authors argue to be an overall criminalization of privacy.

Subjects: Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, December 31, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to Wipe a Computer Clean of Personal Data; AI paper mills and image generation require a coordinated response from academic publishers; US House boots TikTok from government phones; and How to Use ChatGPT and Still Be a Good Person.

Subjects: AI, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, November 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Broken Twitter Means Broken Disaster Response; Third-party data brokers give police warrantless access to 250 million devices; House Dems say facial recognition company misrepresented its help to consumers; and Do’s and don’ts of data de-identification.

Subjects: AI, Big Data, Blockchain, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Employment Law, Legal Research, Privacy

Pete Recommends – Weekly highlights on cybersecurity issues – October 15, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Uber Data Breach Conviction Shows Security Execs What Not to Do; Protect your privacy and your phone number with Firefox Relay; Pro-Russian hackers take credit for cyberattacks on U.S. airport; and Google Chrome Is the Least Secure Browser, Report Shows.

Subjects: Blockchain, Cryptocurrency, Cybersecurity, Privacy, Search Engines, Telecommuting, Travel

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

Subjects: Blockchain, Cryptocurrency, Economy, Energy, Financial System, Legal Research, Technology Trends