ICO 2.0 and business tokenisation

Hello, Khabravchans! I am a programmer with 15 years of development experience. In due time it was possible to work both on accounting systems, and over financial tools and web sites. I found the developer those days when OpenSource was still called a waste of time and watched from the very beginning its evolution into a key engine of technology.
 
 
Now there is a very high HYIP around crypto-currencies and investing in ICO. Knowing how the open technologies influenced the development of this industry, we, with my colleagues from the current work, believe that ICO is the next round in the financing ...
+ 0 -

Probable method of mining Bitcoin

Probable method of mining Bitcoin  
 
I think a little delirium on Tuesday will not hurt much the working week.
 
I have a hobby, at leisure I try to figure out how to crack the bitcoin mining algorithm, avoid a dull nonsense search and find the solution to the problem of selecting a hash with a minimum energy consumption. Immediately I say the result, of course, I have not yet achieved, but nevertheless, why not put into writing the ideas that are born in the head? Where do you need to put them
 
 
Despite the delusionality of the ideas below, I think this article can be useful to someone who studies
 
 
 
C ++ language and its templates
 
a b...
+ 0 -

Asymmetric cryptography with a one-time secret key: description of the idea and possible application

Asymmetric cryptography with a one-time secret key: description of the idea and possible application  
(to understand what is said in this article, it is necessary and sufficient at least in general terms to imagine what is asymmetric cryptography and how the electronic signature works)
 
 
The script for using a one-time secret key is:
 
 
 
A key pair consisting of a secret key (secret key, SK) and an open (public key, PK) key is created.
 
A number of operations are performed using the secret key. The first of these, the creation of a public key, has already been completed in the first step.
 
At first glance, an antilogical action is performed - the secret key is destroyed without the possibility ...
+ 0 -

Information security of bank non-cash payments. Part 6 - Analysis of Banking Crimes

Information security of bank non-cash payments. Part 6 - Analysis of Banking Crimes  
(c) the Ministry of Internal Affairs of Russia. Fragment of recording from surveillance cameras at the moment of theft of money from the ATM
 
References to other parts of the study [/b]
 
Information security of bank non-cash payments. Part 1 - Economic fundamentals.
 
Information security of bank non-cash payments. Part 2 - Typical IT-infrastructure of the bank.
 
Information security of bank non-cash payments. Part 3 - Forming requirements for the protection system.
 
[leech=https://habr.com/post/351326/] Information security of bank non-cash ...
+ 0 -

Implementation of the new transport protocol NTCP2 network I2P

Implementation of the new transport protocol NTCP2 network I2PTransport protocols I2P were developed almost 15 years ago, when the main task was to hide the contents of traffic, rather than the fact of using a particular protocol. dpi and blocking traffic at that time, no one took into account. However, the times are changing, and although the existing I2P protocols are still quite well protected, there is a need for a new transport protocol that responds to existing and future threats, and, first and foremost, dpi, analyzing the length of the packets. In addition, the new protocol uses the most advanced achievements of cryptography. Full description of the ...
+ 0 -

Encryption of the default key in OpenSSH is worse than its absence

The authors of this material argue against the standard key encryption mechanisms in OpenSSH.
 
 
Encryption of the default key in OpenSSH is worse than its absence
 
Recently, attackers used the npm-package eslint-scope to steal npm-tokens from home user directories. In the light of this event, we checked out other similar vulnerabilities and thought about how to reduce the risks and consequences of such incidents.
 
 
Most of us have an RSA SSH key at hand. Such a key gives the owner various privileges: as a rule, it is used to access the production environment or in GitHub. Unlike nmp tokens, SSH keys are encrypted, and therefore it is accepted that nothing terrible ...
+ 0 -

Fintech Digest: The Central Bank accelerates the collection of customer biometrics, the Crypto currency is falling, and the volume of the Internet market for things is growing

Fintech Digest: The Central Bank accelerates the collection of customer biometrics, the Crypto currency is falling, and the volume of the Internet market for things is growing  

 
Hello, Habr!
 
 
In our today's digest today such news:
 
 
 
The Central Bank encourages banks to speed up the collection of biometric data from customers;
 
The Internet of things is gradually increasing its turnover, the volume of the market is increasing;
 
The market of crypto-currencies for a week fell to new antirecords;
 
States continue to fear digital currencies.
 
 
claim , that by 2021 the world market of Internet of things should double the current volume. The figure, which is called ...
+ 0 -

Review of actual protocols for achieving consensus in a decentralized environment

Review of actual protocols for achieving consensus in a decentralized environmentThis article focuses on a superficial review of key approaches to achieving consensus in a decentralized environment. The material will make it possible to understand the tasks that are solved by the protocols considered, their scope of application, design and use features, and will also help to assess the prospects for their development and implementation in decentralized accounting systems.
 
was proposed. proof-of-space-and-time .
 
 
PoS allows for higher network bandwidth and does not require excessive power consumption, like PoW. However, PoS requires more serious analysis in the development ...
+ 0 -

Digest of news from the sphere of block-technologies-

For today's post, we selected interesting new projects based on the blockbuster. NASA launches a lunar project based on Ethereum, the first blocking twins and other blockbuster news read in our digest.
 
 
Digest of news from the sphere of block-technologies-
 
appeared kids who became part of the social project of the Irish company AID: Tech and Dutch PharmAccess, aimed at improving the quality of medical care for mothers and newborns, as well as reducing the number of cases of fraud with the funds of charitable organizations.
 
 
Within the framework of the project, every pregnant woman receives a digital identifier that gives her the right to receive ...
+ 0 -

Oracles, or why smart contracts still have not changed the world?

Oracles, or why smart contracts still have not changed the world?For those who are interested in the topic of smart contracts, the answer to the question given in the header lies on the surface: to date, contracts do not have a reliable and complete source of information about what is happening in the real world. As a result of this, a nasty situation develops: we can describe complex logic in a smart contract, and the block will provide us with its unconditional execution. And now, it would seem, we are a step away from getting rid of the need for a third party when concluding contracts - that is what was meant by the words "change the world" in the title...
+ 0 -