Category «Cryptocurrency»

Inventing the Dark Web

This paper by Thais Sardá, Simone Natale and John Downey examines how the deep Web, i.e., Web sites that are not indexed and thus are not accessible through Web search engines, was described and represented in British newspapers. Through an extensive content analysis conducted on 833 articles about the deep Web published between 2001 and 2017 by six British newspapers, the authors demonstrate that these technologies were predominantly associated with crime, crypto markets and immoral content, while positive uses of this technology, such as protecting privacy and freedom of speech, were largely disregarded. The consistent association by the British press between the deep Web and criminal and antisocial behaviors is exemplary of a recent “apocalyptic turn” in the imaginary of the Web, whereby Web-related technologies are perceived and portrayed in more negative ways within the public sphere. The authors argue that the use of such negative concepts, definitions and associations engender distrust about uses of the deep Web, propagating user stereotypes that reflect what the authors argue to be an overall criminalization of privacy.

Subjects: Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, KM, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues, December 31, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to Wipe a Computer Clean of Personal Data; AI paper mills and image generation require a coordinated response from academic publishers; US House boots TikTok from government phones; and How to Use ChatGPT and Still Be a Good Person.

Subjects: AI, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Financial System, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, November 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Broken Twitter Means Broken Disaster Response; Third-party data brokers give police warrantless access to 250 million devices; House Dems say facial recognition company misrepresented its help to consumers; and Do’s and don’ts of data de-identification.

Subjects: AI, Big Data, Blockchain, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Employment Law, Legal Research, Privacy

Pete Recommends – Weekly highlights on cybersecurity issues – October 15, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Uber Data Breach Conviction Shows Security Execs What Not to Do; Protect your privacy and your phone number with Firefox Relay; Pro-Russian hackers take credit for cyberattacks on U.S. airport; and Google Chrome Is the Least Secure Browser, Report Shows.

Subjects: Blockchain, Cryptocurrency, Cybersecurity, Privacy, Search Engines, Telecommuting, Travel

What is proof-of-stake? A computer scientist explains a new way to make cryptocurrencies, NFTs and metaverse transactions

Prof. Scott Ruoti briefs us on yet another new component in Digital Ledger Technology. Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

Subjects: Blockchain, Cryptocurrency, Economy, Energy, Financial System, Legal Research, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, September 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Lens reflections may betray your secrets in Zoom video calls; Multi-factor authentication (MFA) fatigue; How Pig Butchering Scams Work; and Crypto giveaway scams continue to escalate.

Subjects: Cryptocurrency, Cybersecurity, Gadgets, Gadgets/Gizmos, Legal Research, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, August 13, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Hospital and Drugmaker Move to Build Vast Database of New Yorkers’ DNA; Your iPhone’s deleted voicemails aren’t actually deleted; FTC Contemplates Rules to Protect Against Commercial Surveillance and Lax Data Privacy; North Korean hackers target crypto experts with fake Coinbase job offers.

Subjects: Big Data, Cryptocurrency, Cybercrime, Cybersecurity, Healthcare, Privacy, Social Media