Distributed Ledger Security Primer

Distributed Ledger Security Primer

The distributed ledger technology (DLT) that underlies cryptocurrencies like Bitcoin and Ethereum is a promising new technology. But as with any new system, it comes with unique security considerations—ones that have received less attention than they deserve. As with many other technologies in the past, attackers will likely start small before attempting more sophisticated attacks; this post will help you understand what these attacks might look like on a blockchain-based network and how to defend against them.

The Digital Ledger

The digital ledger is a record of all transactions that have occurred on the network. It’s distributed across many nodes, which means that no one person or entity can control it. The ledger is immutable: once information has been added to it, it cannot be changed or deleted without being noticed by other participants in the network. In addition to these features making a blockchain tamper-proof, they also make it …

Distributed Ledger Security Primer Read More
Email Phishing

Email Phishing

Phishing is a way to scam users into giving up their sensitive information, usually through email spoofing. The messages look like they’re from a legitimate company, but they’re really trying to trick you into entering your password or other information at a fake website. Phishing expedites identity theft because the user has willingly entered their password on what appears to be their bank’s site.[4]

Phishing is an attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Phishing is an attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons. Phishing is typically carried out by email or instant messaging and can be detected by its poor spelling and grammar. Phishing scams often direct users to enter personal …

Email Phishing Read More
Industry-Defining Infrastructure As A Service

Industry-Defining Infrastructure As A Service

The IaaS model is the most popular cloud computing model in the market today. It provides virtualized computing resources over the internet, allowing end users to use them on a pay-per-use basis. In other words, you only pay for what you use rather than buying costly hardware and software licenses outright.

IaaS is a cloud computing model that provides virtualized computing resources over the internet.

IaaS is a cloud computing model that provides virtualized computing resources over the internet. These resources can be used to build and run applications, or they can simply be consumed as-is by users.

IaaS providers offer virtual machines (VMs) with varying amounts of memory, CPU cores and storage space for lease on demand. Customers pay only for what they use, whether it’s a few hours at night or 24/7 access during peak business hours with no downtime in between shifts–and without having to purchase any …

Industry-Defining Infrastructure As A Service Read More
A Comparison of Consensus Algorithms

A Comparison of Consensus Algorithms

In the world of blockchain technology, there are numerous different consensus algorithms. Some of these are better suited to short-term considerations and others are better suited for long-term use. This article will cover each of the most popular consensus algorithms in detail, and help you decide which one best fits your needs.

Proof of Work

Proof of work is a system that requires a computer to find a solution to a mathematical problem before it can add its block to the blockchain. The difficulty of this task varies depending on how much effort is being put into mining across the network. In proof-of-work systems, miners must compete with one another in order to be awarded new bitcoins or transaction fees paid by users sending transactions across the network.

In addition, proof-of-work systems make it more difficult for someone (or some entity) who does not own any computing power themselves but …

A Comparison of Consensus Algorithms Read More