Home » Tag Archives: secure

Tag Archives: secure

Novel Defense Techniques To Secure Tor Communications – A Research Study

The Tor network depends mainly on resources, which are owned and managed by volunteers, to cater daily for millions of internet users seeking to maintain high levels of anonymity and privacy. As such, these resources have to be efficiently managed, by the Tor network, while also dealing with challenges facing its utility and robustness. A large percentage of the challenges ... Read More »

Cooperation an Essential Factor Needed To Secure IoT Says Europol

The embracing of the Internet of Things (IoT) has led to the creation of new legal, policy and regulatory challenges which has a broader and complex scope. Europol announced on October 19th that these challenges can be tackled when there is the existence of cooperation between different sectors as well as different stakeholders. This remark came after a two-day joint ... Read More »

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, there are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

A Novel System for Secure Offline Bitcoin Payments

Bitcoin is inarguably the most successful cryptocurrency so far, when market capital and growing popularization are considered. Users have to have online access to be able to initiate transactions to spend their bitcoins. A certain amount of time is required for the transaction to be successfully confirmed and validated (20-30 minutes in most cases). However, a large number of real ... Read More »

DRAFT.PNG

DRAFT – Using Financial Derivatives To Secure the Assets of Decentralized Applications (DAPPs)

Ethereum contracts can be formulated to act like decentralized applications, or DAPPs. Numerous DAPPs are already operating including a role playing game, an online marketplace, an internet service provider and a prediction market. Unfortunately, DAPPs are vulnerable to hacking, and the funds they hold can be stolen. The recent attack on a DAPP, known as DAO, has revealed that smart ... Read More »

Secure Multi-party Computing Using Bitcoin’s Blockchain

Secure multiparty computation (MPC) has been extensively researched during the past 30 years as it can theoretically provide limitless computational power. The rise of bitcoin and the blockchain technology, during the recent few years, have created new possibilities that can revolutionize MPC. Inspired by bitcoin, a group of researchers published a thesis that focused on the formulation of a secure ... Read More »

Battle of the Secure Smartphones

Dark web users just love having their smartphone communications spied on, right? (Detect any sarcasm there?) While no internet-connected device is 100% secure, some definitely are more armored than others.  In the smartphone arena, several phones consistently rank among the best. To which ones might I be referring? The Kali Linux NetHunter 3.0, Copperhead OS, and Blackphone 2 are a ... Read More »

Blockchain Technology May Be Borrowed By DARPA To Secure Military Networks

Blockchain, the technology that underlies digital cryptocurrencies such as Bitcoin, has acquired a different identity. According to Steve Norton’s article “CIO Explainer: What Is Blockchain?” published in the Wall Street Journal, he explains how the technology is emerging as an alternative way for companies to instantaneously make and verify their network transactions. A considerable number of firms are experimenting with ... Read More »

Tor’s Plan to Secure the Internet of Things

The Tor Project is joining forces with Home Assistant, and The Guardian to create a newer security system to funnel all the data traffic for the device to the end user via Tor, not public internet.  The new system is the Home Assistant platform, only it’s running a special Tor Onion Service Configuration. You only need a device that’s Raspberry-Pi ... Read More »

A comparison of secure Linux installs: Tails and LPS

There’s many lengths one can go to when it comes to operation security or personal privacy. One of the safest and best options for keeping your data safe is running an intentionally secure Linux distribution. There’s two main players in this line of operating systems: Tails and LPS. Tails is known everywhere, but LPS has been generating a significant amount ... Read More »

A Brief Comparison of Secure Messaging Apps

We are in a period of time where personal security is of rising concern. No longer is data protection only essential to network admins in corporations and government entities, but it’s becoming something that even people who haven’t even heard of the deepweb are becoming conscious of. Because of this, companies are starting to release tools and software to make ... Read More »

Copperhead, Guardian Project & F-Droid To Build Secure Mobile Ecosystem

Copperhead, Guardian Project, and F-Droid are partnering up and want to raise funding for an “open, verifiably secure mobile ecosystem of software, services and hardware”, according to the Guardian Project’s blog. The blog post goes on to say, “Through a future planned crowdfunded and commercial offering, the partnership will provide affordable off-the-shelf solutions, including device hardware and self-hosted app and ... Read More »

UN CITO Plans To Secure Dark Web With “Digital Blue Helmets”

Techtarget made an interview with Atafeh Riazi, the UN CITO (Chief Information Technology Officer), where she shared her ideas how to secure the dark web. According to her, the dark net can be foiled with “Digital Blue Helmets”, an expert group that will serve as the peacekeepers of the cyber world. She made this statement about the new group: “We ... Read More »