Searching for "bitcoin"

Role of Blockchain in Web 3.0

Role of Blockchain in Web 3.0

Web 3.0 is the third generation of internet services which provide websites and applications with the technology to run. Web 3.0 is set to be powered by AI and peer-to-peer applications like blockchain. The key difference between Web 2.0 and Web 3.0 is that Web 3.0 is more focused on using innovative technologies like machine learning and AI to create more personalized content for each user. It is also expected that Web 3.0 will be more secure than its predecessors because of the system it is built upon.

Blockchains are made up of blocks that store information. Each block has a unique “hash” that differentiates it from other blocks. These blocks are then connected by a chain in chronological order. The information stored in these blocks is permanent, which makes it a very secure way to complete online transactions.
This is why cryptocurrencies, like Bitcoin, are built on blockchain technology.

+++++++++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Twitter hacked

Twitter Continues to Face Scrutiny Amidst Political Backlash Due to High-Profile Hack

By IGI Global on Oct 22, 2020
https://www.igi-global.com/newsroom/archive/year-old-hack-twitter-could/4668/
the New York Department of Financial Services (DFS) has released an investigation report on Twitter. This report outlines the high profile attack that overtook popular celebrity accounts (including former U.S. president Barack Obama, celebrity and businesswoman Kim Kardashian West, Amazon mogul Jeff Bezos, and other notable celebrities) and led to the theft of US$ 118,000 in bitcoin.
DFS has called on the U.S. government to regulate social media platforms, such as Twitter and Facebook, on cybersecurity, along with antitrust and content moderation.
Prof. Sachin Tiwari, from Jawaharlal Nehru University, India, analyzes the meaning and nature of cybercrime legislation as well as the scope of policy formation in the global narrative of cybersecurity in his article, “Cyber Crime Regulation, Challenges, and Response,” sourced from the  Encyclopedia of Criminal Activities and the Deep Web (IGI Global).
++++++++++++++++++++++++++++
more on Twitter in this IMS blog
https://blog.stcloudstate.edu/ims?s=twitter

universities collaboration microcredentialing

9 Universities to Collaborate on Digital Credentials Initiative

By Rhea Kelly 04/23/19 https://campustechnology.com/articles/2019/04/23/9-universities-to-collaborate-on-digital-credentials-initiative.aspx

he institutions involved are Delft University of Technology in the Netherlands, Harvard UniversityDivision of Continuing Education, Hasso Plattner Institute at the University of Potsdam in Germany, MITTecnológico de Monterrey in Mexico, Technical University of Munich in Germany, University of California, BerkeleyUniversity of California, Irvine and the University of Toronto in Canada.

Researchers from the universities plan to build on pioneering efforts such as MIT’s Blockcerts pilot, to create a trusted, distributed and shared infrastructure that will allow learners to:

  • Maintain a verifiable record of lifelong learning achievements (including badges, internships, bootcamps, certificates, MicroMasters and stackable credentials, as well as traditional degrees);
  • Receive credentials digitally and safely;
  • Share credentials with employers or other institutions;
  • Own their credentials forever, without having to ask or pay their institution for a transcript; and
  • Compile and curate credentials received from multiple educational institutions.

“Alternative digital credentials fill an important gap between learning and work-relevant skill verification. The adoption of an ADC system will allow universities to achieve greater alignment with the demands of both students and local economies, making universities more accountable for what they produce,” commented Gary W. Matkin, dean of Continuing Education and vice provost of Career Pathways at UC Irvine. “Young adults are demanding shorter, relevant education that they can put to immediate use. Industry hiring practices will increasingly depend on digital searches for job candidates and ADCs will make those competencies easier to discover.”

“Digital credentials are like tokens of social and human capital and hold tremendous value for the individual. The crucial opportunity we have today is to bring together institutions that share a commitment to the benefit of learners, and who can act as stewards of this infrastructure,” said Philipp Schmidt, director of learning innovation at the MIT Media Lab.

“Our shared vision is one where academic achievements, and the corresponding credentials that verify them, can open up new pathways for individuals to become who they want to be in the future,” said José Escamilla, director of TecLabs Learning Reimagined at Tecnologico de Monterrey.

For more information, visit the Digital Credentials project website.

++++++++++++++++
more on microcredentialing in this IMS blog
https://blog.stcloudstate.edu/ims?s=microcredentialing

Blockchain next election

Blockchain Disciples Have a New Goal: Running Our Next Election

Amid vote-hacking fears, election officials are jumping on the crypto bandwagon — but cybersecurity experts are sounding an alarm

At democracy’s heart lies a set of paradoxes: a delicate interplay of identity and anonymity, secrecy and transparency. To be sure you are eligible to vote and that you do so only once, the authorities need to know who you are. But when it comes time for you to mark a ballot, the government must guarantee your privacy and anonymity. After the fact, it also needs to provide some means for a third party to audit the election, while also preventing you from obtaining definitive proof of your choice, which could lead to vote selling or coercion.
Building a system that accomplishes all this at once — and does so securely — is challenging enough in the physical world. It’s even harder online, as the recent revelation that Russian intelligence operatives compromised voting systems in multiple states makes clear.
In the decade since the elusive Satoshi Nakamoto published an infamous white paper outlining the idea behind bitcoin, a “peer-to-peer electronic cash system” based on a mathematical “consensus mechanism,” more than 1,500 new cryptocurrencies have come into being.
definition: Nathan Heller in the New Yorker, in which he compares the blockchain to a scarf knit with a single ball of yarn. “It’s impossible to remove part of the fabric, or to substitute a swatch, without leaving some trace,” Heller wrote. Typically, blockchains are created by a set of stakeholders working to achieve consensus at every step, so it might be even more apt to picture a knitting collective creating that single scarf together, moving forward only when a majority agrees that a given knot is acceptable.
Unlike bitcoin, a public blockchain powered by thousands of miners around the world, most voting systems, including Votem’s, employ what’s known as a “permissioned ledger,” in which a handful of approved groups (political parties, election observers, government entities) would be allowed to validate the transactions.
there’s the issue of targeted denial-of-service (DoS) attacks, in which a hacker directs so much traffic at a server that it’s overwhelmed and ceases to function.
Although a distributed ledger itself would likely withstand such an attack, the rest of the system — from voters’ personal devices to the many servers a vote would pass through on its way to the blockchain — would remain vulnerable.
there’s the so-called penetration attack, like the University of Michigan incursion, in which an adversary gains control of a server and deliberately alters the outcome of an election.
While it’s true that information recorded on a blockchain cannot be changed, a determined hacker might well find another way to disrupt the process. Bitcoin itself has never been hacked, for instance, but numerous bitcoin “wallets” have been, resulting in billions of dollars in losses. In early June 2018, a South Korean cryptocurrency exchange was penetrated, causing the value of bitcoin to tumble and resulting in a loss of $42 billion in market value. So although recording the vote tally on a blockchain introduces a new obstacle to penetration attacks, it still leaves holes elsewhere in the system — like putting a new lock on your front door but leaving your basement windows open.
A blockchain is only as valuable as the data stored on it. And whereas traditional paper ballots preserve an indelible record of the actual intent of each voter, digital votes “don’t produce an original hard-copy record of any kind,”
In the end, democracy always depends on a certain leap of faith, and faith can never be reduced to a mathematical formula. The Economist Intelligence Unit regularly ranks the world’s most democratic counties. In 2017, the United States came in 21st place, after Uruguay and Malta. Meanwhile, it’s now widely believed that John F. Kennedy owed his 1960 win to election tampering in Chicago. The Supreme Court decision granting the presidency to George W. Bush rather than calling a do-over — despite Al Gore’s popular-vote win — still seems iffy. Significant doubts remain about the 2016 presidential race.
While little doubt remains that Russia favored Trump in the 2016 election, the Kremlin’s primary target appears to have been our trust in the system itself. So if the blockchain’s trendy allure can bolster trust in American democracy, maybe that’s a net positive for our national security. If someone manages to hack the system, hopefully they’ll do so quietly. Apologies to George Orwell, but sometimes ignorance really is strength.

+++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Why Blockchain is Hard

Why Blockchain is Hard

Jimmy Song Bitcoin Educator, Developer and Entrepreneur/PGP Fingerprint: C1D7 97BE 7D10 5291 228C D70C

https://medium.com/@jimmysong/why-blockchain-is-hard-60416ea4c5c

What is a blockchain?

The main thing distinguishing a blockchain from a normal database is that there are specific rules about how to put data into the database. That is, it cannot conflict with some other data that’s already in the database (consistent), it’s append-only (immutable), and the data itself is locked to an owner (ownable), it’s replicable and available. Finally, everyone agrees on what the state of the things in the database are (canonical) without a central party (decentralized).

It is this last point that really is the holy grail of blockchain. Decentralization is very attractive because it implies there is no single point of failure.

The Cost of Blockchains

  • Development is stricter and slower
  • Incentive structures are difficult to design
  • Maintenance is very costly
  • Users are sovereign
  • All upgrades are voluntary
  • Scaling is really hard

Centralization is a lot easier

Like it or not, the word “blockchain” has taken on a life of its own. Very few people actually understand what it is, but want to appear hip so use these words as a way to sound more intelligent. Just like “cloud” means someone else’s computer and “AI” means a tweaked algorithm, “blockchain” in this context means a slow, expensive database.“blockchain” is really just a way to get rid of the heavy apparatus of government regulation. This is overselling what blockchain can do. Blockchain doesn’t magically take away human conflict.

So what is blockchain good for?

Most industries require new features or upgrades and the freedom to change and expand as necessary. Given that blockchains are hard to upgrade, hard to change and hard to scale, most industries don’t have much use for a blockchain. a lot of companies looking to use the blockchain are not really wanting a blockchain at all, but rather IT upgrades to their particular industry. This is all well and good, but using the word “blockchain” to get there is dishonest and overselling its capability.

+++++++++++
more on blockchain in this IMS blgo
https://blog.stcloudstate.edu/ims?s=blockchain

blockchain and refugees

blockchain for refugees

As Norwegian Refugee Council research found, 70 percent of Syrian refugees lack basic identification and documents showing ownership of property.

The global passport

Host nations certainly has a share in the damage, as they face problems concerning the accessibility of vital information about the newcomers — dealing with the undocumented refugee, the immigration service can’t gain the information about his/her health status, family ties or criminal record, or verify any other vital data that helps them make a decision. Needless to say, this may lead to the designation of refugee status being exploited by economic migrants, fugitives or even the war criminals that caused the mass displacement to begin with.

Another important issue is data security. Refugees’ personal identities are carefully re-established with the support of clever biometric systems set up by the U.N. Agency for Refugees (UNHCR). UNHCR registers millions of refugees and maintains those records in a database. But the evidence suggests that centralized systems like this could be prone to attacks. As a report on UNCHR’s site notes, Aadhaar — India’s massive biometric database and the largest national database of people in the world — has suffered serious breaches, and last year, allegations were made that access was for sale on the internet for as little as $8

Finland, a country with a population of 5.5 million, cannot boast huge numbers of refugees. For 2018, it set a quota of 750 people, mainly flying from Syria and the Democratic Republic of Congo. That’s way less than neighboring Sweden, which promised to take in 3,400. Nevertheless, the country sets a global example of the use of effective technology in immigration policy: It’s using blockchain to help the newcomers get on their feet faster.

The system, developed by the Helsinki-based startup MONI, maintains a full analogue of a bank account for every one of its participants.

Speaking at the World Economic Forum in Davos in January 2018, the billionaire investor and philanthropist George Soros revealed that his structures already use a blockchain in immigration policies

In 2017, Accenture and Microsoft Corp. teamed up to build a digital ID network using blockchain technology, as part of a U.N.-supported project to provide legal identification to 1.1 billion people worldwide with no official documents.

a Memorandum of Understanding (MOU) with blockchain platform IOTA to explore how the technology could increase efficiency.

++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

Encyclopedia of Criminal Activities and the Deep Web

>>>>>>> Publishing Opportunity <<<<<<<<<<<<<<

Encyclopedia of Criminal Activities and the Deep Web

Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.

In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.

You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).

Recommended topics for papers include, but are not limited to:

  • Bitcoin and Crime
  • Botnets and Crime
  • Child Exploitation
  • Contract Killing
  • Criminology
  • Cryptocurrency
  • Cyber Espionage
  • Cyber Stalking
  • Cybercrime
  • Cybercriminals
  • Cybersecurity Legislation
  • Cyberterrorism Fraud
  • Dark Web
  • Dark Web Vendors
  • Darknets
  • Data Privacy
  • Dating Websites and Crime
  • Deep Web
  • Drug Trafficking
  • E-Banking Fraud
  • Email Scams
  • Fraud and Internet
  • Gaming and Crime
  • Government Regulations of the Dark Web
  • Hacking and Crime
  • Hacktivism
  • Human Trafficking
  • Identity Theft
  • International Regulations of the Dark Web
  • Internet Privacy
  • Internet Regulations
  • Internet Safety & Crime
  • Online Advertisement Websites and Crime
  • Online Blackmail
  • Online Forums and Crime
  • Online Hate Crimes
  • Online Predators
  • Online Privacy
  • Social Media Deception
  • Social Networking Traps
  • Undercover Dark Web Busts
  • Undercover Operations
  • Vigilante Justice
  • Virtual Currencies & Crime
  • Whistleblowing

IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018

Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication. 

Should you have any questions regarding this publication, or this invitation, please do not hesitate to contact: EncyclopediaCADW@igi-global.com

Mehdi Khosrow-Pour, DBA
Editor-in-Chief
Encyclopedia of Criminal Activities and the Deep Web
EncyclopediaCADW@igi-global.com

Data Privacy Lessons in Alternative Reality Games

How Data Privacy Lessons in Alternative Reality Games Can Help Kids In Real Life

https://www.kqed.org/mindshift/51772/how-data-privacy-lessons-in-alternative-reality-games-can-help-kids-in-real-life

Ubiquitous social media platforms—including Facebook, Twitter and Instagram—have created a venue for people to share and connect with others. We use these services by clicking “I Agree” on Terms of Service screens, trading off some of our private and personal data for seemingly free services. While these services say data collection helps create a better user experience, that data is also potentially exploitable.

The news about how third parties obtain and use Facebook users’ data to wage political campaigns and the mounting evidence of election interference have shined a spotlight on just how secure our data is when we share online. Educating youth about data security can fall under the larger umbrella of digital citizenship, such as social media uses and misuses and learning how not to embarrass or endanger oneself while using the internet.

Darvasi’s students in Toronto can pool together 55 faux bitcoins to purchase and launch the BOTTING protocol against an opponent. The student targeted at Fallon’s school in Connecticut would then have 48 hours to record audio of 10 words of Darvasi’s students choosing and send it back to them through an intermediary (Darvasi or Fallon). For a higher price of 65 faux bitcoins, students can launch MORPHLING, which would give the opponent 48 hours to record a one-minute video explaining three ways to stay safe while using Facebook, while making their school mascot (or a close approximation of) appear in the video in some way during the entire minute.

+++++++++++++
more on digital citizenship in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+citizenship

starter platform for blockchain developers

IBM has been focused on bringing the blockchain to enterprises for years. Earlier this year, the company announced IBM Blockchain Starter Services, Blockchain Acceleration Services and Blockchain Innovation Services.
According to the company, the Blockchain Platform was initially built for institutions working collectively towards mission-critical business goals
Other features include: access to IBM Blockchain Platform Enterprise Plan capabilities, code samples available on GitHub, and Hyperledger Composer open-source technology.

+++++++++++++++
more on blockchain platforms in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain+platforms

Blockchain Platforms 2018

A Comprehensive List of Best Blockchain Platforms To Watch Out in 2018

https://medium.com/@anubhav.2709/a-comprehensive-list-of-best-blockchain-platforms-to-watch-out-in-2018-a4a14ee0c166

http://blockchain.oodles.io/blogs/best-blockchain-platforms-2018/

A Comprehensive List of Best Blockchain Platforms To Watch Out in 2018 from TechNewsToday

Best Blockchain Platforms 2018

1. Ethereum

Founded in 2014 by Vitalik Buterin, Gavin Wood, and Jeffery Wilcke, Ethereum is one of the fastest growing blockchain technology-based platforms and a cryptocurrency like bitcoin.

 

2. Ripple

Ripple was developed in 2012. Currently, the cryptocurrency that represents Ripple blockchain, XRP, is one the high performing cryptocurrencies in the crypto world.

3. Hyperledger

Based on the blockchain technology, Hyperledger offers distributed ledger frameworks to a variety of industry leaders in the fields of banking, finance, Internet of Things, supply chains, manufacturing, and technology.

 

4. IBM Bluemix Blockchain:

Developed using the base of Hyperledger, IBM Bluemix offers transparency in transactions and security in information for enterprises. At present, IBM Bluemix runs on the IBM cloud.

 

5. Multichain

Multichain is one of the best Blockchain platforms that enables the creation and execution of private blockchains. This multi-asset exchange is becoming popular for solving real problems in finance, infrastructure, and e-commerce.

 

6. Openchain: 

Developed by Coinprism, Open-chain is a Blockchain infrastructure that’s used for the perseverance and management of digital assets.  Open-chain is an enterprise-ready platform for digital assets. Its approach is different than the standard Bitcoin approach to implementing Blockchain.

Conclusion: 

With the above-mentioned blockchain platforms, you can get unprecedented services for the security of digital transactions and assets. The blockchain technology provides independent and secure work structure and is a reliable solution that can be utilized to streamline an organization’s processes and transfer of assets without getting into any extensive documentation or periodical controls.

++++++++++++
more on blockchain in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

1 2 3 4