Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?It is not actually a meshnet. It is software defined networking, it is much more powerful than just meshnet. Its a new type of networking and new completely new protocol and networking namespace, independent of the existing internet.
are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC?The coins are locked into 100 addresses, each with 1 million coins each. And they are released sequentially.
How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?PoS and PoW use miners. Miners receive new coins every block as a block reward. So miners are making money and will fight to control the network. An everyone will suffer because the newly created coins represent inflation.
nxt i think is doing ok..There were three people that each owned 30% of the coin. One decided he wanted out and began dumping. NXT was over 150 million I think. When he started dumping, it basicly killed NXT.
What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?Yes. Bitcoin has no purpose. An altcoin does two things - check your balance - send money to other people
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?What I am saying, is that NXT would be a lot further along than it is now and probably around where Ethereum is, except for that mistake in the distribution and keeping it too concentrated. It set them back by years. They did not consider what the impact on the price would be, over the long term, when one of the early whales started selling off or decided he wanted out.
So the skycoin wallet will be a VPN for our internet usage?The VPN is just one application, that uses bandwidth over Skywire. There are several things in development.
So if there is no block reward what is the incentive to run a node?running a consensus node does not cost anything. You can run it on a raspberry pi.
So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?We have decentralized storage, which is called CXO. But only the bandwidth is monetized by Skywire. We do not nickle and dime and try to attach a coin cost to every API call. Everything that should be free is free. So its a different philosphy.
so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?We will have a distribution page, up on the website soon. Its complicated.
Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the networkYes. This is very important.
on your website it says you will have a NON- Turing complete lisp language?That is probably an error. LOL. We will have a new website soon.
Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?Yes. We are going to get from 20% to 30% distributno of the coins, through network incentives for people running Skywire nodes, consensus nodes and services.
I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?No. This is just something easy, that we have working. Its not the largest applicatoin at all.
Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?Maidsafe is in version 2 or 3. Maidsafe will not have a real coin until version 9. Each version takes them about two or three years. Maidsafe will not be "done" or ready for atleast 18 years at this rate.
Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background?I think there are over ~60 people who have worked on Skycoin or have made major contributions. Its really a project from the darknet.
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.Yes. The key functionality is two things - connecting to people by public key (networking) - distributing self validating, immutble data peer to peer (transactions, blocks etc... content addressible storage)
Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?The people who funded the project for the first four years, were early bitcoin and deep crypto people; who were unhappy with the fact that Bitcoin and the other alts did not seem concerned about the core issues at all. They gave us over 1200 bitcoin I think, over several years and did not ask for anything in return.
Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.I think there wer three different groups that merged together in first three years, that had similar objectives. Because the code was in different language. There was python, C code and then eventually golang and the golang code became the basis for the current codebase.
With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?I think the Skycoin price has been doubling every 40 days, for as long as I can remember. However, it will still be years before it is in the top 20, its still a long way to climb. It took bitcoin years to go from 0 to $1, even though it was growing at 1% per day the whole time for six years.
best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors.we are going to use arm
|Do you still do malware analysis as a part of your day job ? Do you have some advices for someone searching a job in the field ?||You need to pick your focus area. What do you want to do? Penetration testing? Encryption? Malware analysis? Forensics? Underground intelligence? Counter-espionage? Then you need to find mentors and coaches. The easiest way to do this is via online forums dedicated to your focus area. For example, check forum.infosecmentors.com.|
|SANS has some great online resources for people starting up in this area: check them out.|
|Do you see malware analysis as a growth field for careers? Why?||Good malware analysts will always get a job. And malware isn't going to go away any time soon.|
|It's not just security companies who are hiring people in this field. Many large companies and telcos have their own CERT teams which hire malware analysts.|
|Is it true that it isn't a huge challenge to modify malware in a way that it is not detected by any current anti virus program, so that people building bot nets or infiltrating computers with Trojans usually smuggle them past virus scanners?||It's trivial to modify existing malware so that traditional antivirus programs won't detect it any more. It only takes couple of minutes.|
|That's why antivirus programs have been moving towards behaviour-based detection models as well as towards reputation-based detection models.|
|Do note that testing behaviour-based blocking is hard. That's why it's misleading when people post links to sites such as Virustotal as evidence that particular file is 'not detected by AVs'. There's no way to know if a particular antivirus would have blocked the file, unless you would try to run it.|
|"As far as we can see, this program has never been executed by anyone else anywhere. You are the first person on the planet to run this file. This is highly unusual. We will block this file, even though we can't find any known malware from the file"|
|The only problem with this scenario are software developers, who compile their own programs. They obviously are the first persons on the planet to run a particular program - as they made it themselves! They can easily whitelist their output folder to avoid this problem though.|
|Can you recommend any behaviour-based or reputation-based blocking software in particular (for Windows and/or OS X)?||Well, our own antivirus has these built in.|
|Europol's cybercrime taskforce recently took down over a hundred darknet servers. Did the news shake your faith in TOR?||People use Tor for surfing the normal web anonymized, and they use Tor Hidden Service for running websites that are only accessible for Tor users.|
|Both Tor use cases can be targeted by various kinds of attacks. Just like anywhere else, there is no absolute security in Tor either.|
|I guess the takedown showed more about capabilities of current law enforcement than anything else.|
|I use Tor regularily to gain access to sites in the Tor Hidden Service, but for proteting my own privacy, I don't rely on Tor. I use VPNs instead. In addition to providing you an exit node from another location, VPNs also encrypt your traffic. However, Tor is free and it's open source. Most VPNs are closed source, and you have to pay for them. And you have to rely on the VPN provider, so choose carefully. We have a VPN product of our own, which is what I use.|
|I use a VPN regularly from work to bypass filters, and at home to avoid those pesky cease-and-desists. Although I'm not a infosec professional I've always heard that how secure you are using a VPN is directly related to whether or not their logs of your traffic can be traced back to you. How secure in your opinion are VPN providers (such as PIA which I personally use)? And in wake of the prevalence of government surveillance now can VPN providers claims of 'not keeping logs' be trusted to protect privacy?||Use a VPN provider you trust. Someone who's been in the security business for a long while. Also, aim for a vendor who doesn't store logs of user activity.|
|Do you keep logs on the VPN?||Freedome stores no logs.|
|How safe are current smart phones and how secure are their connections? Are special phones used by politicians really safe, or do they get hacked as well?||The operating systems on our current phones (and tablets) are clearly more secure than the operating systems on our computers. That's mostly because they are much more restricted.|
|Windows Phones and iOS devices don't have a real malware problem (they still have to worry about things like phishing though). Android is the only smartphone platform that has real-world malware for it (but most of that is found in China and is coming from 3rd party app stores).|
|It is interesting the Android is the first Linux distribution to have a real-world malware problem.|
|Lot's of people are afraid of the viruses and malware only simply because they are all over the news and realtively easy to explain to. I am personally more afraid of the silently allowed data mining (i.e. the amount of info Google can get their hands on) and social engineering style of "hacking".||Companies like Google and Facebook make money by trying to gather as much information about you as they can. But Google and Facebook are not criminals and they are not breaking the law.|
|How would you compare these two different threats and their threat levels on Average Joes point of view - which of them is more likely to cause some harm. Or is there something else to be more afraid of even more (govermental level hacks/attacks)?||There are different problems: problems with security and problems with privacy. Security problems come from criminals who do break the law and who directly try to steal from you with attacks like banking trojans or credit card keyloggers. Blanket surveillance of the internet also affects us all. But comparing these threats to each other is hard.|
|Thoughts on bitcoin from a security standpoint?||Bitcoin is interesting, in many different ways.|
|I do believe in cryptocurrencies. It might not be Bitcoin that changes the world, but something built on that will.|
|We see Bitcoin in our line of work all the time. Wallet theft. Ransomware where Bitcoin are used to pay the ransoms. Mining trojans.|
|However, that's just like blaming cash for being too handy for drug dealers.|
|Bitcoin is just a tool. Can be used for good or bad.|
|Favorite debugging tool?||I've always had a soft spot for the old DEBUG.EXE that shipped with MS-DOS...|
|E0100 B0 13 CD 10 68 00 A0 07 31 FF B1 C8 E8 20 00 51.|
|E0110 B9 40 01 E8 19 00 D8 C3 DF 1C D8 E3 8A 04 DF 1C.|
|E0120 32 04 24 1F AA E2 EC 59 E2 E2 83 07 10 EB D9 89.|
|E0130 0C DF 04 D9 C0 DE 07 DE 74 04 D9 FE DE 4C 14 C3.|
|Is this real? Link to www.youtube.com.||No, that's not how you break into a system in the real world.|
|Another timely rebuttal of movie hacking, speaking about the ads for the upcoming Black Hat movie: Link to carbon-dynamics.squarespace.com - this one is written by Dan Tentler.|
|With the rise of the Internet of Things, what measures can we take to better secure ourselves in regards to home devices (laptops, smart-tvs, etc)?||Well, you won't be running an antivirus on your washing machine or toaster, that's for sure.|
|The real-world attacks against IoT devices are still limited - mostly because the ways of making money by hacking washing machines and so are limited.|
|As a result, the IoT security solutions aren't really widely available yet. They will be in the future though.|
|Is it unethical to release viruses that kill viruses? Or would it be hard to tell the good buys from the bad guys (eventually)?||The idea of a 'good virus' has been discussed to death already years ago. The consensus is that anything good that could be done with self-replicating code could be done better without the replication.|
|See Dr. Vesselin Bontchev's seminal paper on this: Link to www.virusbtn.com|
|I have a dream. Link to i.imgur.com||Nice pic...|
|Linux distributions generally don't need antivirus, but apart from the fact that most malware is written for Windows, why do you think this is? If linux became the popular choice on desktops, do you think it would be as prone to malware as Windows is? How about OS X?||Most mobile malware IS written for Linux, since most smartphones run Linux.|
|So first and foremost, it's a question of market shares.|
|After that it's a question of attacker skillsets. If the attackers have been writing Windows malware since Windows XP, they aren't likely to stop and switch easily to OS X or Linux unless they have to. And they don't have to.|
|What's your take on security researchers withholding their findings regarding state sponsored malware for 'global security concerns'? Kaspersky and Symantec both withheld information about Reign malware. Is this common? Is it ethical? Why are security companies beholden to the intelligence community and not the people who pay them for their services and advice? How can this conflict of interest be resolved while retaining independence and integrity?||Nobody was withholding detection. Everybody detected all Regin-related files they had, and protected the end users. Which one would you rather have us to do? Sign an NDA, get the samples and protect our users? Or not sign the NDA and not protect our users.|
|Many people I talk to about this privacy thingy say "I have nothing to hide, so why bother". Do you think this will ever change, that people would start caring about this? Have you already seen the general opinion sifting...?||Some people will always say this. But they are always the people who haven't really thought it through.|
|If you have nothing to hide, you can't keep a secret. If you have nothing to hide, show me your search history. If you have nothing to hide, give me your password. If you have nothing to hide, I can't trust you.|
|At this point, what do you personally feel about security and mass surveillance in a post-Snowden world where still not much has changed?||I've learned that many, many people just don't care. Which is depressing.|
|If you don't care about mass surveillance for your own case, how about caring on behalf of the future generations?|
Der Bitcoin nimmt nach der Korrektur auf unter 9. 23.07.2020 Send, receive, and store SLP tokens directly in your Bitcoin Cash wallets. These tokens exist on the Bitcoin Cash blockchain itself. Instead of being used as a currency, SLP tokens can represent literally anything—from dollar-pegged stablecoins to virtual gaming assets and loyalty points. More than just a safe place to store Bitcoin . Take control of your Bitcoin. Our non-custodial wallet ... The range of bitcoin wallets available can be almost as confusing as the concept of bitcoin itself. Here we break it down into the main types on offer and explain their pros and cons. For each type, we’ll provide details of some of the most popular and reputable options currently available. Coin exchange. Coin exchanges are places where you can trade (buy/sell) cryptocurrencies, in exchange ... Die Blockchain: Das Rückgrat der BitCoin-Währung. Die Banken verteufeln BitCoin nicht, sondern sie greifen eine Erneuerung, die im Zuge des Ursprungspapers von Satoshi Nakamoto (dem mysteriösen Erfinder von BitCoin) entstanden ist, für zukünftige Entwicklungen der digitalen Finanzwelt auf: Die Blockchain.Da BitCoin eine reine digitale Währung ohne Kontrolle von Seiten der Zentralbanken ... Bitcoin Wallet For Darknet! Not with bitcoin wallet for darknet the intent to shill monero but because claiming that cloak online work from home from mobile is truly anonymous is a flat out lie.. Darknet Market mortality risks. Mello TV No menu assigned; Google Policy Change Forces Bitcoin Wallet to Remove Security. Dnm redditSome sites also support peer-to-peer (P2P) transactions, without all ...
[index]          
Best hardware wallet - how to store cryptocurrencies best hardware wallet. Ellipal Wallet - Secure your crypto's. https://amzn.to/2Y9YRsZ #hardwarewallet #... Dark.fail https://www.torproject.org Dark Wallet for Bitcoin aimed to make bitcoin transactions near to untraceable. Dark Wallet is an easy-to-install plug-in that sits discreetly on users' Chrome or Firefox browsers. In diesem Video biete ich einen Überblick über BitCoin-Wallets und gebe Tipps. Videos zum Thema Bitcoin folgen sollte Interesse bestehen! Sämtliche ... Detayları sitemizden görebilirsiniz.. www.CyberDark.org www.CyberTR.org www.CyberTor.org