Home » Author Archives: Tamer Sameeh

Author Archives: Tamer Sameeh

Research: Exploring the Regulation System and Market Culture of AlphaBay

Legal marketplaces are governed by federal state law, and market participants hold the right to resort to legal recourse whenever they might be faced with fraudulent behavior. Law enforcement promotes insurance, stability and transparency of commerce taking place across legal markets. Interestingly enough, illegal markets have to somehow emulate the main approaches adopted by legal markets to become successful and ... Read More »

Research: Most Studies that Examined the Structure of Darknet Communities Weren’t Accurate!

Throughout the past decade, the popularity of Darknet usage has been skyrocketing secondary to the public’s concern regarding their privacy and anonymity on the internet. Most research studies delving into the structural features of darknet communities during the past few years, concluded that most activities taking place in various darknet communities are more or less illegal. However, more recently, many ... Read More »

Using Bitcoin Transaction Analysis In Deanonymizing Users of Tor Hidden Services

Anonymity over the world wide web has never been a more critical issue. To achieve bulletproof anonymity, multiple solutions are being currently implemented by internet users all over the world. The most popular of which is the Tor network that represents the busiest anonymous communication network on the internet serving millions of users every day. Tor also enables webmasters to ... Read More »

An Overview of the Current Status of Linux’s Hyperledger Project

The Hyperledger project represents an initiative that was launched by the Linux Foundation in December 2015 to build an open source platform for the development of blockchains. The Hyperledger aims at establishing a proficient ecosystem throughout which coders and entrepreneurs can meet up and collaborate to build blockchains. So, Hyperledger is not a cryptocurrency; instead, it is a specialized hub ... Read More »

Novel Defense Techniques To Secure Tor Communications – A Research Study

The Tor network depends mainly on resources, which are owned and managed by volunteers, to cater daily for millions of internet users seeking to maintain high levels of anonymity and privacy. As such, these resources have to be efficiently managed, by the Tor network, while also dealing with challenges facing its utility and robustness. A large percentage of the challenges ... Read More »

Tor (the myth and reality.PNG

An Overview of Sniper Attacks Against the Tor Network & Current Defenses

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

Utilizing the Blockchain Technology To Combat Global Software Piracy

Since the late 1970s, software piracy has grown into a serious problem negatively affecting software developers and undermining their ability to preserve the copyrights of their digital creations. The past 30 years have witnessed significant advancements in various computing technologies. However, developments and innovations in communications technologies have catalyzed software piracy, via provision of high speed delivery, mobility and portability ... Read More »

algorithmic-improvements-give-bitcoin-mining-a.width-660.jpg

Bitcoin Mining – Is It Still Profitable?

The best answer for this question would be “it all comes down to how much you will invest.” However, to get a more meaningful answer, there are multiple factors to be considered: 1. The price of bitcoin is constantly changing and the volatility is currently extremely high. One bitcoin is currently worth more than $11,000, and less than a month ... Read More »

Can Cryptomarkets Minimize The Harms Associated With Illicit Drug Use?

Cryptomarkets are special forms of online marketplaces that are hosted on the deep web, and feature a large number of vendors. Buyers and vendors on cryptomarkets enjoy the anonymity provided to them by the deep web, as their web locations are concealed and cryptocurrency payments render it almost impossible to track them. Drug trading on various cryptomarkets has recently evolved ... Read More »

Detection of Malicious or Black IP Addresses Via Analysis of Daily Darknet Traffic

The world has recently began to recognize the significance and dangerous impact of various forms of network vulnerabilities. Moreover, cybercriminals can exploit these vulnerabilities to phish sensitive and private information from the machines of vulnerable web users. As such, researchers have recently began to thoroughly study how countermeasures can be created to solve various network vulnerability issues. A recently published ... Read More »

Using a Large Scale Darknet To Identify Botnet Related Activities

The consequences of a wide array of malware programs, which are present today, have led to perilous incidents that induced serious damage not only to users’ assets, but also to the internet’s infrastructure. This is notably the case with botnets, which represent networks of compromised machines that are remotely controlled by botmasters to perform various forms of nefarious activities. By ... Read More »

The SSH Public Key Authentication Protocol Over Tor – How Vulnerable It Is to Timing Attacks?

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »

Tor Fingerprinting – Is the Tor Browser Immune Against Browser Fingerprinting?

On October 4, 2013, the Guardian published a report which stated that Edward Snowden, a former CIA employee and whistleblower, sent the British newspaper classified documents that proved that the National Security Agency (NSA) had been repeatedly making attempts to formulate successful attacks against Tor, or the onion router. However, the report claimed that all of NSA’s attempts failed to ... Read More »

TorPolice – A Novel Framework For Enforcing Access Control Policies Across the Tor Network

The Tor network represents the most popular anonymity network, which is currently used by millions of users all over the world. Nevertheless, access control doesn’t exist for users of the Tor network, which renders the network susceptible to malicious attacks and botnet abuse. For instance, adversaries often exploit exit relay nodes utilizing them as stepping stones for various forms of ... Read More »