Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

Fighting The Citadels That Own Our Data: How Web3 Empowers Us To Take Back Control

Fighting The Citadels That Own Our Data: How Web3 Empowers Us To Take Back Control

In the face of myriad privacy breaches as a result of the ownership of our data by big corporations, Web 3.0 – otherwise known as a decentralised internet based on true peer-to-peer interaction – represents a beacon of hope to enable individuals to take back control from the current generation of internet behemoths.

Firefox's New Anti-Tracking Feature Blocks Cryptomining and Fingerprinting Sites: How to Enable

Firefox's New Anti-Tracking Feature Blocks Cryptomining and Fingerprinting Sites: How to Enable

Given the rise in harmful practices like cryptocurrency mining and fingerprinting, Mozilla has now introduced a new anti-tracking feature for its Firefox browser. Once you are on the latest Nightly Beta 68 or Beta 67 version of Firefox , the anti-tracking feature will have to be enabled manually.

Brave Can Destroy Google’s and Facebook’s Business Model

Brave Can Destroy Google’s and Facebook’s Business Model

Starting from the next month Brave will distribute to the browser users 70 percent of the revenue they get from advertisers so they can tip publishers. Users of the Brave browsers have the ability to choose not to see or see Ads and earn BAT and tip their preferred content creators directly.

Tor Accepts Dash Donations, Advancing Privacy Initiative

Tor Accepts Dash Donations, Advancing Privacy Initiative

The Tor Project is now accepting donations in Dash and eight other cryptocurrencies to fund the initiative of increasing individuals’ privacy for “protection against tracking, surveillance, and censorship”. These features help Dash better service consumers that wish to maintain their privacy, which makes it a great pairing for Tor donations.

How Australia Will Handle Cryptocurrency Hacks After Coincheck

How Australia Will Handle Cryptocurrency Hacks After Coincheck

What the Coincheck hack tells us about how Australian regulators will handle a cryptocurrency hack Hacks like the one on Coincheck expose gullible investors to risk, but it also means funds could be flowing undetected into the hands of money launderers and terrorists.

Facebook Plans to Become World’s Biggest Central Bank?

Facebook Plans to Become World’s Biggest Central Bank?

If Facebook issued its own digital currency, and all its users had a Facebook mobile wallet with Facebook coins in it, then the need for credit cards will diminish more and more.

Neutrino Saga Reveals Coinbase User Data Was Leaked

Neutrino Saga Reveals Coinbase User Data Was Leaked

Now, a Coinbase executive has reportedly gone on record to state that a previous intelligence firm hired by the exchange was caught selling customer data to third parties for a profit.

Cyber criminals earn $3bn a year exploiting social platforms

Cyber criminals earn $3bn a year exploiting social platforms

Apps, adverts and links are the primary delivery mechanism for cryptocurrency mining software on social platforms, with the majority of malware detected by this research mining monero (80%) and bitcoin (10%), earning $250m a year for cyber criminals.

Once hailed as unhackable, blockchains are now getting hacked

Once hailed as unhackable, blockchains are now getting hacked

A blockchain protocol is a set of rules that dictate how the computers in the network, called nodes , should verify new transactions and add them to the database.

Data Surveillance Shows Why We Need Cash, Cryptocurrencies

Data Surveillance Shows Why We Need Cash, Cryptocurrencies

Cryptocurrencies like bitcoin afford us with financial autonomy by allowing us to send money directly without the need to rely on a third party. The first step, as Brito points out, is to recognize the critical role that digital cash plays in securing our financial autonomy.

Grin and BEAM: Two Groundbreaking Private Cryptocurrencies Just Went Live

Grin and BEAM: Two Groundbreaking Private Cryptocurrencies Just Went Live

Two further privacy-oriented cryptocurrencies launched in January 2019: Grin and BEAM. The blockchain technology was proposed by an anonymous developer called Tom Elvis Jedusor – an anagram of “Je Suis Voldemort.” MimbleWimble is built with privacy at its core.

Testing your web browser for cryptojacking

Testing your web browser for cryptojacking

With the rise of cryptocurrency, cryptojacking has become very popular and many websites employ the use of scripts to use your computing device to mine for cryptocurrency. To take the free cryptojacking test visit

Buying Bitcoin? 4 Criteria For Choosing the Right Crypto Exchange

Buying Bitcoin? 4 Criteria For Choosing the Right Crypto Exchange

For example, CoinMarketCap lists over 100 cryptocurrency exchanges at the time of writing. If this is your first time buying cryptocurrency, you can eliminate the vast majority of crypto exchanges immediately.

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin Banks Are Coming. Wave Goodbye to Your Privacy

Bitcoin banking: trends so far Here are just a few of the reasons for this prediction: Fidelity (one of the biggest asset management companies on the planet) is launching a crypto custody service .

3 Rules To Make Sure Your Cryptocurrency Is Never Hacked or Stolen

3 Rules To Make Sure Your Cryptocurrency Is Never Hacked or Stolen

It is only the exchanges, wallets, and apps that use bitcoin that leave security holes open. A crypto wallet is exactly what it sounds like, a place to store your bitcoin and cryptocurrencies.

Six Reasons Why Privacy Coins Are Not Just For Criminals

Six Reasons Why Privacy Coins Are Not Just For Criminals

Financial Privacy for Businesses Businesses who accept and hold cryptocurrencies can also benefit from using anonymous coins over pseudonymous coins such as bitcoin. Hence, citizens who want to prevent their financial data from being harvested and potentially misused, anonymous digital currencies offer a great alternative to all existing payment methods.

Can You Buy Bitcoin Anonymously?

Can You Buy Bitcoin Anonymously?

You can sign up to localbitcoins.com with an alias email address and then search for sellers accepting one of the various cash methods (cash by mail, deposit, or at ATM). When you purchase bitcoin from an ATM, you’ll usually be asked to provide a bitcoin wallet address.

The Safest Ways to Buy a VPN Anonymously

The Safest Ways to Buy a VPN Anonymously

While Bitcoin is still the most popular anonymous payment method, some VPN providers are now accepting other altcoins, like Ripple, as well. Not all providers accept this type of payment, so be sure you double check before you purchase your card.

Uncle Sam Wants to Snoop on Your Monero Transactions

Uncle Sam Wants to Snoop on Your Monero Transactions

According to the document, blockchain monitoring frameworks geared toward Zcash and Monero are of special interest to the DHS because its existing Bitcoin-focused analytics capabilities “cover only a limited scope within the realm of cryptocurrencies.” The expansion into the privacy cryptocurrency area is intended to keep pace with newer blockchain implementations and demonstrate that the DHS possesses sufficient extensibility to deal with the threat posed by illegal hidden transactions.

How to Use Crypto Anonymously part 1: Bitcoin Isn’t as Anonymous as You Think

How to Use Crypto Anonymously part 1: Bitcoin Isn’t as Anonymous as You Think

If someone knows my public address, they can search for it and see every bitcoin transaction I’ve ever made, how much was involved, and which other “public addresses” I’ve interacted with. Your bitcoin transactions are only private until someone pierces your pseudonym.

Blockchain - An Innovative Technology to Transfer and Secure Information

Blockchain - An Innovative Technology to Transfer and Secure Information

Blockchain is a decentralized, digital ledger in which all cryptocurrency transactions are recorded publicly. It is a constantly growing list of chronological records, which are called Blocks and it allows market participants to keep track of their transactions made using cryptocurrency without the need for central recordkeeping.

Hackers Invade YouTube Ads To Mine Cryptocurrency

Hackers Invade YouTube Ads To Mine Cryptocurrency

The hackers probably targeted YouTube because the platform is so popular, Trend Micro said in a Friday blog post. In this case, the mining scripts in the YouTube scheme were configured to siphon 80 percent of the PC's computing power, Trend Micro said.

Ledger Nano S Limited Edition Review – CryptoLauren

Ledger Nano S Limited Edition Review – CryptoLauren

This company has created software devices specially designed for the safe storage of popular cryptocurrencies. Ledger provides the most robust devices for the secure storage of your cryptocurrency. They have developed a remarkably secure structure, placing themselves at the top of the digital wallet options.

Fidelity driving into Crypto Lane — Top 5 Implications — Cautiously Bullish

Fidelity driving into Crypto Lane — Top 5 Implications — Cautiously Bullish

The company will be officially called as Fidelity Digital Assets that will provide an enterprise-grade custody solution, a cryptocurrency trading platform and consulting services 24 hours a day all through the week.

Someone Hijacked MEGA Chrome Extension to Steal Users' Passwords

Someone Hijacked MEGA Chrome Extension to Steal Users' Passwords

"You are only affected if you had the MEGA Chrome extension installed at the time of the incident, autoupdate enabled, and you accepted the additional permission, or if you freshly installed version 3.39.4," the company warned.