Home » Articles (page 10)

Articles

Botnets and the Deep Web

A bot is a special form of malware that is considered one of today’s most sophisticated tools of cybercrime. They enable hackers to control a large number of computers simultaneously, and turn them into an army of “zombie” machines, that operate collectively as a powerful “botnet” to create spam, and commit various forms of malicious activities. What is a botnet? ... Read More »

Monero GUI Wallet Guide

Monero was the first altcoin to be added to a deep web market. The Alphabay announcement was actually the main catalyst for the amazing rally that took Monero from the $2 mark to $20. It is a privacy driven cryptocurrency and it’s one of the best in its field. However, for a long time, Monero didn’t have its own Graphic ... Read More »

What is a User Activated Soft Fork?

We’re at crosspoint in the Bitcoin journey, where it is up to members of the community to decide what Bitcoin will become and how it will adapt to its growing user base. In the future, we’ll probably look back at this as another page in a long history book and be proud to have been part of this technological revolution. ... Read More »

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, there are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

Botnets for Discovering and Monitoring Terrorism Related Content on the Dark Web

The recent global epidemic of terrorist attacks has revealed how terrorists are not only utilizing the surface web, but also the dark web for building and establishing their networks. To counteract this, Law Enforcement Agencies (LEAs) need efficient and effective means for detection and monitoring of terrorism related content on the internet, in order to prevent the occurrence of terrorist ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

The bitcoin blockchain and truly trusted computing

The idea of “Trusted Computing” is neither new nor complicated and involves code being electronically signed so that it cannot damage your computer. The idea is to “certify” software to avoid it causing the computer to crash or any other negative effects. The practical problems of such technology become obvious if you use either open-source or free software – the ... Read More »

Classification of Illegal Activities On the Tor Network

If we envision the internet as an ocean, the Surface Web represents no more than the superficial waves flowing on top. The deep web, on the other hand, represents information that is deeply sunken and cannot be accessed by conventional search engines. The Deep Web contains a number of Darknets, that cannot also be indexed by conventional search engines, and ... Read More »

Examining the Bitcoin Address Graph

Bitcoin is by far the most popular unregulated, decentralized cryptocurrency. Since the genesis block was mined, the number of bitcoin users has been rising at a rather exponential rate. While bitcoin’s public ledger offers high levels of transparency, it does not directly reveal the real-world identity of either the senders or receivers of bitcoin transactions. A single bitcoin transaction is ... Read More »

AsicBoost: Scaling Debate Turns into Investigation

The Bitcoin scaling debate is one that has been going on for years and has been constantly evolving as new Bitcoin Improvement Proposals emerge. Most recently, Bitcoin Unlimited and SegWit have been competing for miner approval in order to activate their respective protocol changes. With these two main options on the table, Bitcoin has been split in two factions. Those ... Read More »

Tutorial – Altcoin Flipping : Making Money Online Via Trading Cryptocurrencies

The year of 2017 is definitely the year of crypto, especially that the market capital of cryptocurrencies has reached its all time high during the past week, recording around $28.7 billion according to data from coinmarketcap.com. Many cryptocurrency traders, or more precisely “altcoin flippers”, as myself have made some good profits during the past few weeks. I managed to double ... Read More »

How Companies are Deanonymizing Bitcoin

One of the most common misconceptions regarding Bitcoin is that it is anonymous or untraceable, when in fact this couldn’t be further from the truth. Bitcoin is the opposite of untraceable. All of the transactions that have ever occurred in the network are stored in the immutable and public ledger that is the Blockchain. One could counter with the fact ... Read More »