'Simjacker' Attack Can Track Phones Just by Sending a Text

White house spying, North Korea sanctions, and more of the week’s top security...

Read More

What Are Zero-Knowledge Proofs?

How do you make blockchain and other transactions truly private? With mathematical models known as zero-knowledge proofs.

Read More
Distrust of the Bolivar Prompts Venezuelans to Seek Sound Money
Sep15

Distrust of the Bolivar Prompts Venezuelans to Seek Sound Money

There’s a small team of committed researchers and activists called the Ryver Bitcoin Cash group surveying Venezuelans, and giving them educational resources about the benefits of bitcoin cash. The Venezuelan country has been suffering from rapid inflation and many people distrust the sovereign bolivar. Unfortunately, most Venezuelans are not getting any exposure to digital currency use cases, and according to Ryver’s...

Read More
How Prime Brokerage Will Affect Crypto Markets
Sep15

How Prime Brokerage Will Affect Crypto Markets

Prime brokerage firms are coming for crypto in what’s likely to be a race of winner-takes-almost-all. Goldman Sachs is synonymous with institutional wealth and power, even to those who’ve never purchased a financial product in their life. Like the eponymous tower it occupies in Jersey City, Goldman Sachs dominates the prime brokerage trade. What will happen when crypto gains its own Goldman Sachs – an institutional...

Read More
Judge Recommends to Deny Summary Judgment Against Tor Exit Node Operator in Piracy Case
Sep15

Judge Recommends to Deny Summary Judgment Against Tor Exit Node Operator in Piracy Case

Tor is an anonymity tool used by millions of people. Dubbed the “Onion Router”, it operates by sending traffic through various nodes, after which it enters the public Internet again. This setup makes the source of the traffic pretty much impossible to trace. However, it also means that people who operate a Tor exit node have their IP-address associated with a lot of traffic they’re not the source of. When pirates use...

Read More