article thumbnail

On the Dangers of Cryptocurrencies and the Uselessness of Blockchain

Schneier on Security

Nothing in that letter is out of the ordinary, and is in line with what I wrote about blockchain in 2019. In response, Matthew Green has written —not really a rebuttal—but a “a general response to some of the more common spurious objections …people make to public blockchain systems.”

article thumbnail

Illegal Content and the Blockchain

Schneier on Security

Security researchers have recently discovered a botnet with a novel defense against takedowns. Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

BPR examples are not one-time projects, but rather examples of a continuous journey of innovation and change focused on optimizing end-to-end processes and eliminating redundancies. This blog outlines some BPR examples that benefit from a BPM methodology. This can enable significant cost savings and improve profitability.

article thumbnail

Central Bank Digital Currency (CBDC) and blockchain enable the future of payments

IBM Big Data Hub

The financial world has been revolutionized by blockchain technology, which has enabled peer-to-peer transactions without the need for intermediaries. The introduction of Central Bank Digital Currency (CBDC) has added a new dimension to blockchain technology that transforms the future of payments for businesses and individuals.

article thumbnail

The Fake Browser Update Scam Gets a Makeover

Krebs on Security

New research shows the attackers behind one such scheme have developed an ingenious way of keeping their malware from being taken down by security experts or law enforcement: By hosting the malicious files on a decentralized, anonymous cryptocurrency blockchain. Image: Guard.io.

article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

However, these attacks aren’t due to exchange security flaws; malicious actors are exploiting the underlying consensus protocols of blockchains themselves. Every blockchain uses a consensus protocol which allows all nodes on the network to agree on the current state of the blockchain.

article thumbnail

Institutional Investor’s Introduction to Blockchain and Digital Asset Investing

Data Matters

Given the growth of markets for cryptocurrencies and other blockchain-based assets, often referred to as “digital assets,” we see growing interest from traditional investment managers in gaining exposure to this emerging asset class. A threshold issue is how the derivatives regulations applicable to swaps and security-based swaps in the U.S.