Home » Articles (page 10)

Articles

Tutorial – How To Start a Full Bitcoin Node On Windows

As the present happenings seem to be taking us to an almost inevitable bitcoin hard fork, it is pivotal now to point out to bitcoin enthusiasts, that running a full node today will have positive influence on the bitcoin ecosystem during the upcoming critical period in the history of bitcoin. As an experienced bitcoiner, I would recommend starting a full ... Read More »

How to start a career writing about cryptocurrencies

Bitcoin, and the blockchain technology in general, have created tens of jobs that were not available before the genesis block was first mined. Script & multisig developers, microtransaction engineers, ASIC chip designers, cryptocurrency escrow agents and cryptocurrency journalists & writers are few examples of jobs that never existed before the advent of bitcoin. Writing about cryptocurrencies can be a reasonably ... Read More »

What is Augur? (A Search Engine for the Future)

Augur is a decentralized prediction market platform built on the Ethereum network. Although this may not sound very exciting at first, it actually is. The platform brings together old and new concepts and technologies to create a useful tool for some and a revenue stream for others. The concept of a prediction market isn’t new. The idea is to speculate ... Read More »

Botnets and the Deep Web

A bot is a special form of malware that is considered one of today’s most sophisticated tools of cybercrime. They enable hackers to control a large number of computers simultaneously, and turn them into an army of “zombie” machines, that operate collectively as a powerful “botnet” to create spam, and commit various forms of malicious activities. What is a botnet? ... Read More »

Monero GUI Wallet Guide

Monero was the first altcoin to be added to a deep web market. The Alphabay announcement was actually the main catalyst for the amazing rally that took Monero from the $2 mark to $20. It is a privacy driven cryptocurrency and it’s one of the best in its field. However, for a long time, Monero didn’t have its own Graphic ... Read More »

What is a User Activated Soft Fork?

We’re at crosspoint in the Bitcoin journey, where it is up to members of the community to decide what Bitcoin will become and how it will adapt to its growing user base. In the future, we’ll probably look back at this as another page in a long history book and be proud to have been part of this technological revolution. ... Read More »

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, there are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

Botnets for Discovering and Monitoring Terrorism Related Content on the Dark Web

The recent global epidemic of terrorist attacks has revealed how terrorists are not only utilizing the surface web, but also the dark web for building and establishing their networks. To counteract this, Law Enforcement Agencies (LEAs) need efficient and effective means for detection and monitoring of terrorism related content on the internet, in order to prevent the occurrence of terrorist ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

The bitcoin blockchain and truly trusted computing

The idea of “Trusted Computing” is neither new nor complicated and involves code being electronically signed so that it cannot damage your computer. The idea is to “certify” software to avoid it causing the computer to crash or any other negative effects. The practical problems of such technology become obvious if you use either open-source or free software – the ... Read More »

Classification of Illegal Activities On the Tor Network

If we envision the internet as an ocean, the Surface Web represents no more than the superficial waves flowing on top. The deep web, on the other hand, represents information that is deeply sunken and cannot be accessed by conventional search engines. The Deep Web contains a number of Darknets, that cannot also be indexed by conventional search engines, and ... Read More »

Examining the Bitcoin Address Graph

Bitcoin is by far the most popular unregulated, decentralized cryptocurrency. Since the genesis block was mined, the number of bitcoin users has been rising at a rather exponential rate. While bitcoin’s public ledger offers high levels of transparency, it does not directly reveal the real-world identity of either the senders or receivers of bitcoin transactions. A single bitcoin transaction is ... Read More »