Ethereum Pro White Paper. Released November 12th, 2017

Size: px
Start display at page:

Download "Ethereum Pro White Paper. Released November 12th, 2017"

Transcription

1 Ethereum Pro White Paper Released November 12th, 2017

2 Abstract In the world of cryptocurrency, there lacks a means to provide reliable confidence in the approval process of transactions, with the result being an increased exposure to risk for users of cryptocurrency, especially those in the alt coin and ERC20 token world. Our proposed design presented in this paper is intended to empower cryptocurrency users with the same convenient confidence they have come to expect from more commonplace electronic transactions, without the unnecessary costs, delays, and middle-men normally associated with those methods. The crypto world is fraught with scams, bad actors, and illegal activity as a result of its decentralized and unregulated nature. It is the wild west of financial instruments, and we present a way to tame it just a bit. We would like to bring peace of mind to those who invest, trade, and pay for goods and services with cryptocurrency, and blockchain technology. This is what we are here to share with you in this document. Addressable Need and Problem at Large The ERC20, ICO, and larger cryptocurrency ecosystem lacks financial transaction approval with confidence, an expectation both consumers and merchants have come to expect as a part of every day transaction due to the rapid adoption of electronic payment technologies over the past 30 years. Specifically, fraud checks that exist in the traditional financial ecosystem such as stolen card detection, unusual spending activity detection, and the blacklisting of bad actors in the economy (ultimately leading to freezing of assets) are completely missing in the world of cryptocurrency. This has both good and bad ramifications, and we believe the bad ramifications of this is preventing growth and adoption of crypto-currency. There are a wide range of threats, mistakes, and deliberate scams that can materially impact users acquiring, holding, or transferring their virtual currency. Many of these threats could be mitigated by effectively identifying and alerting users at the time they choose to transact from their wallets. These threats are continually evolving and often times very hard to detect, if at all, by investors or users. Threats in Cryptocurrency

3 Ponzis Description These are schemes that involve guaranteed profits. They generally use new investors in the contract or token s investment dollars (or tokens, eth, etc) as a source of profits for earlier investors. This creates an economic system that is destined to collapse when enough investors attempt to pull out of their positions. A real-world example was famously publicized when former stockbroker Bernie Madoff defrauded investors for a total loss of nearly $65 billion dollars in a Ponzi scheme [1]. Blockchain-based Ponzi schemes are likely destined to have the same outcome, and crypto investors should avoid these types of projects. According to an SEC investor advisory Investments tend to go up and down over time, especially those seeking high returns. Be suspect of an investment that generates consistent returns regardless of overall market conditions. [2] Detection Detecting Ponzi schemes could theoretically be possible via solidity smart contract static analysis. By parsing the AST (Abstract Syntax Tree) of a contract, we can detect lines of code that appear to send fixed percentage returns up through a chain of linked addresses. Not all cases of percentage-based transfers of tokens or ETH are guaranteed to be ponzis, but it is one factor that can contribute to an overall safety score. With manual review of solidity smart contracts and marketing materials, the community could report Ponzi tokens to a central repository as described later in this paper. Bugs In Solidity Code Description In a document published by Consensys, A guide to smart contract security best practices [3] there is guidance on a common list of bugs such as Reentrancy, Crossfunction Race Conditions, Integer Overflow and Underflow, DoS with (Unexpected) revert, DoS with Block Gas Limit, and the now corrected (via hard fork in Ethereum) Call Depth Attack. Each one of these attacks can lead to unexpected outcomes crafted specifically by nefarious actors communicating with the smart contract, or through accidental errors. A high profile example of a programming error was the DAO hack, which led to a $50 million dollar theft of virtual currencies, eventually leading up to the first Ethereum hard fork, splitting Ethereum in to Ethereum Classic (ETC) and Ethereum (ETH) [4]. Detection Many of these bugs cans (and are) detected via static analysis. However, this analysis and its repercussions are not made clear to investors at the moment of transaction. Instead, they are presented in various obscure web services that check for vulnerabilities automatically. Because we know programming errors are already being automatically detected, we can therefore prove that it is possible to detect at least some common bugs, and present a notice at the moment of transfer of funds in a userfriendly way.

4 Second, bugs can also commonly be found by manual review, and reported by the community. Third, by using the first two items are inputs, and a true/false label for the data, we can train binary classifiers using industry-standard machine learning software such as Tensorflow, to infer through generalizations of supervised learning how to predict potential bugs in smart contract source code. At the time of this writing, the authors are not aware of a system such as this existing in the wild. However code-level analysis via machine learning can be likened to natural language processing, where consumers can see for themselves via language translation software, smart assistants, and search algorithms that this type of logistic inference is well within the realm of possibility using currently available technology. It needs only be developed and integrated. Token Locking Description In some cases, especially with ICOs that are working with certain crowd-funding provisions, it is legally necessary to lock the transfer of tokens until a certain duration has passed, or a specific date has occurred. There is no problem with this kind of thing as long as it is clearly stated at the time of exchange between the would-be token investor and the token issuer. However, there are other times where a token trading lock is set in place without the knowledge of the buyer. To compound things, the unlocking of the token is sometimes an editable variable that can be changed at any moment by the owner of the smart contract. This can lead to very heavy-handed market manipulation by the smart contract owner, leading to erratic market behavior, and material loss of value in a locked token. This centralized style of stopping all trade from happening (or select trade) is a hallmark of a manipulative token market, and should be avoided. Detection Detecting token locking largely depends on a few components. The first, and simplest way to detect token locking in an ERC20, is to examine if the AST presents a standardized set of ERC20 transfer and approval functions. If these functions are unmodified, it is extremely unlikely that a locking mechanism is in place anywhere in the contract. Secondly, and in addition to the above checks, it is trivial to examine the AST for date value types. The presence of a date type alone means nothing by itself, but in combination with a modified transfer & approve function, may mean locking is present. If the above two detections are fired, we can assume there is at least a risk of token locking being present, and can then proceed with a community evaluation or manual review to determine if token locking characteristics are present, and if so to what degree these factors are influenced by the smart contract owner. Infinite Minting Description

5 In the case of a owner-controlled smart contract, is it possible to create new tokens by simply increasing the balance variable of an ERC20 address. For many token investors, infinite minting gives too much centralized control over the total supply of tokens to be considered a safe investment. Similar to how the Federal Reserve mints new dollars in the United States, infinite minting capabilities allows for inflation. The Federal Reserve proponents would argue that this capability allows for adjustments and corrections to the markets in the case of economic emergencies. Whether this is true is an academic argument economists continue to have. It is our belief that while the capability for any single entity to deliberately create inflation via the minting of additional tokens can be used to stabilize markets, it has a negative effect on the value of any tokens being held. Therefore, inflation and infinite minting can be viewed as a method of systematically removing value from individuals, and redistributing it to others, and therefore may be considered by some to not be a sound investment or adequate store of value over time. This is made evident by the common advisory to buy gold, or other such commodities whose value is tied directly to real-world value, rather than being controlled in value via a centralized minter. Detection Infinite token or coin minting is trivial to uncover by manual review, and can easily be reported. It is also potentially trivial to uncover with fuzz testing on a private Ethereum node. Fuzz testing involves making randomized function calls in to a smart contract, thousands of times per second on an offline version of the Ethereum blockchain, and detecting if the total supply of coins ever increases or decreases. Environment and Dependencies The system we propose involves an SDK (Software Development Kit) that could be used by developers of wallets, private key injection bridges, exchanges, and other blockchain developers to access a set of REST endpoints providing a centralized database of real-time calculated scores, where the primary key used for indexed lookups via REST calls is the recipient address. REST calls can be sent via curl, AJAX, native http requests in mobile apps, or through the use of an Oracle in the event of a smart contract. Because this SDK will simply wrap asynchronous network requests, it is fairly trivial to produce, or for any open source contributor to develop a REST wrapper, offering easy-to-use functions to retrieve scores in their native programming language. For this reason we believe the SDK can spread to a multitude of platforms quickly, with relative ease. As a way to get the ball rolling, we recommend an SDK for the most common backend programming environments, with the intent of integrating with web-based Javascript Python Go PHP Ruby Oracle

6 In the case of a smart contract, accessing an external API or web service presents a real problem. Trust in a blockchain network relies on multiple nodes verifying transactions, and coming to a clear consensus on the result. Introducing external dependencies threatens this alignment among the nodes, as nodes may receive a different result. Ultimately leading to confusion on the network. The solution to this relies on smart contracts retrieving this external data from an oracle. An oracle is an agent on the blockchain that listens for events that indicate a request for data. Once an event is heard, the makes a secure request to a trusted service and pushes the resulting data as a transaction back into the blockchain. This results in every node having the same copy of the data bringing consensus back to the network. A decentralized approach to testing? In our previous explanation, we reviewed how an oracle would request data from a trusted service. Trusting a single entity / service undermine the goals of a decentralized system, so a decentralized approach is something to consider. A key feature of the proposed SDK is the testing of a contract's source code using static code analysis. This is a perfect example of a feature that could naturally be implemented in a decentralized way. For each test within the static code analysis suite, a spec could be provided that clearly explains what this specific test is attempting to validate. Potential test runners would go through a vetting process to establish they have met the specification. When a request for a test is received by the SDK, this network of test runners would all run their version of the test spec and a consensus would need to be made on the test outcome to rule out any false positives/negatives. This rules out the possibility for any single point of failure and would bolster the overall effectiveness of the test suite as inconsistencies are identified and fixed. The User Experience An SDK could allow consumers, via wallet integrations, to automatically scan addresses before approving the sending of cryptocurrency from their wallet. The scan could work to identify the legitimacy, integrity and validity of the recipient address, prior to completing the transaction. This two-factor approach will allow users to gain actionable insight into their transaction before committing to any payment. What Makes this Different than the blockchain s existing security mechanism? By offering an SDK that communicates to a centralized backend, in real-time, to provide a multidimensional score for your transaction and whom you are transacting with, developers can bring together a diverse data set of usable intelligence to empower users with confidence. As opposed

7 to the completely decentralized blockchain, this proposal involves a centralized authority in an advisory role. This centralized backend works to create a comprehensive and objective risk factor, leveraging key data points and indicators, and then providing that insight to users prior to completing a transaction. Determining Risk An algorithm would bring together a complex set of data from a wide range of sources, such as current and historical trading analysis, transactional history, community based transaction feedback, relative currency strength, analysis of currency code and platform, development strength, adoption and usage. Leveraging machine learning, expert human analysis and community driven form factors will lead to an evolving and continual improvement of identifying risk. Machine Learning Machine learning is a popular approach to detecting fraud, stolen cards, and the like with credit card issuers and we believe the same approach could be taken on the blockchain. The primary requirement for machine learning is to have an adequate amount of labeled data. For our purposes we may use either a binary classier to indicate a simple good or bad transaction, as well as a linear regression to address an overall risk score, such as 98% - High risk or 1% - Low risk. By harvesting community data, performing heuristic static code analysis, and manual review we will collect a large labeled data set for exactly this purpose. Over time it should be possible to do a simple linear regression on these data point. These should be normalized using sigmoid activations due to the shallow nature of the neural network necessary for analytical analysis. A sigmoid activation function simply causes each individual component to be normalized relative to each risk factor. The logistic curve of a sigmoid function. Image credit [5] REPRESENTING DATA FOR ML A common approach in the world of machine learning is to first change the representation of data, so that a solution can be found in simple linear regression. We propose we would take this approach with multiple SVMs (Support Vector Machines) that adapt each characteristic in order to find linearly separable levels of fraud prediction. The figure above shows the before representation of a non-linear representations of multiple transactions on the left. Here, a linear regression would be inadequate to predict the non-linear

8 nature of fraud detection of a contract, address, or transaction. However by utilizing multiple SVM s, we can represent this same data to a linear plane, and the resulting projects allows for a simplified linear approach to predictive analysis. Key Features As a result of creating and leveraging an SDK, these are just a few of the features that are possible ADDRESS LABELING Allows owners of an address to indicate a name and associated image with their address, in order to transparently communicate their identity. This is most relevant in the case of an ICO from a new company, or an exchange. VALIDATING KNOWN ADDRESSES By clearly identifying known parties at the moment of transactions, and presenting it in the wallet interface, users can confirm the recipient is who they believe they are. MULTI-DIMENSIONAL SCORING OF ADDRESSES AND SMART CONTRACTS A risk factor aggregating a weight measurement of the common threats is delivered from the centralized API, allowing a wallet to indicate unsafe transactions. ROBUST BLACKLIST A blacklist of known bad actor s addresses could be stored on the centralized server. These addresses can be updated based on the current score of any transaction occurring on an address, and provides a quick one-shot check with a binary result of blacklisted or not addresses FLAGGING After a transaction has taken place and has entered the public ledger, a user could be presented an interface to flag a single transaction as problematic. When a significant number of flags are presented on a single recipient or sending address, the scoring system could increase the associate risk score exponentially with regards to time, as a way to quickly stop new and developing types of problems. Project Risks This is a non-exhaustive list of risk factors to this project s development. We acknowledge these risks are present, and that there may be new and developing risks we have not yet considered. Insufficient funding for development Because of the application of securities laws to the funding of these sorts of projects is uncertain and still developing, it is not clear whether and how such a project would be funded, whether through cryptocurrency tokens or any other funding vehicles. A possible alternative path is that

9 this document can serve as an initial problem statement and overarching design for an open source initiative that could be developed publicly by the community, which may or may not include the authors of the paper. Integration failures It is possible that with certain existing smart contracts and immutable software deployed on the Ethereum blockchain, it will be impossible to integrate our SDK. This is a developing area that needs more research in to each integration point. Due to immutability of some of these types of software, future upgrades such as integrations of this proposed system could prove impossible. While we do not believe these risks will lead to a failure for this type of project development, it is important to recognize and approach risks with mitigating efforts. We feel it s important to share these risks to help the community understand how and why a project such as this one could fail. That being said, we remain optimistic. Result By providing users with actionable insight prior to transaction completion users can assess and analyze their potential exposure to risk. The immediate benefit for this is recognized by the user, but the long-term benefit for the cryptocurrency ecosystem at large is increased consumer confidence and in turn, increased adoption. With increased adoption of cryptocurrency it is possible to leverage these tools to offer lower rates on payments and transfers, reduce the delays in traditional banking payments and transfers, and ultimately give power of the monetary system back to the people who use it every day. The every day consumer grows disempowered in the face of larger and more complex financial instruments on public markets, and we hope this proposed design for a safer, better system will one day revolutionize how we all use money Citations: [1] [2] [3] [4] [5]

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency

More information

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation 2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we

More information

White Paper. Blockchain alternatives: The case for CRAQ

White Paper. Blockchain alternatives: The case for CRAQ White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no

More information

QIIBEE Security Audit

QIIBEE Security Audit PUBLIC QIIBEE Security Audit of QBX TOKEN Smart Contracts June 28, 2018 Produced for by Table Of Content Foreword...................................................... 1 Executive Summary................................................

More information

Vladimir Groshev. COO, Project Coordinator.

Vladimir Groshev. COO, Project Coordinator. Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency

More information

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer

What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

FanChain Contract Audit

FanChain Contract Audit FanChain Contract Audit by Hosho, May 2018 Executive Summary This document outlines the overall security of FanChain s smart contract as evaluated by Hosho s Smart Contract auditing team. The scope of

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

Overview & White Paper.

Overview & White Paper. Overview & White Paper www.phantomx.co CONTENT 2. Introduction 7. Scalability and Network 3. Summary 3. About PhantomX 3. Our mission 4. The team behind PhantomX 5. Specification 8. Proof-of-Work 9. Proof-of-Stake

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Wire Fraud Begins to Hammer the Construction Industry

Wire Fraud Begins to Hammer the Construction Industry Wire Fraud Begins to Hammer the Construction Industry Cybercriminals are adding new housing construction to their fraud landscape and likely on a wide scale. Created and published by: Thomas W. Cronkright

More information

NON-TECHNICAL WHITEPAPER Version 1.0

NON-TECHNICAL WHITEPAPER Version 1.0 NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus

More information

Mobilink-Network Partial List of Partners

Mobilink-Network Partial List of Partners Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the users phone will

More information

INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018

INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018 INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018 Overview PROTOCOL #1 TOKENIZATION PROTOCOL An end-to-end protocol for tokenization of assets across both the Stellar and Ethereum networks PROTOCOL #2 CROSS-CHAIN

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

Orbs is built by developers, for developers, with real business needs in mind. Design strategy is driven by:

Orbs is built by developers, for developers, with real business needs in mind. Design strategy is driven by: About Orbs Orbs is a hybrid blockchain that scales base-layer protocols. It is the first customizable public blockchain designed to provide flexibility for the ever-evolving needs of real businesses. With

More information

neblio Next Generation Enterprise Blockchain Solutions v

neblio Next Generation Enterprise Blockchain Solutions v neblio Next Generation Enterprise Blockchain Solutions v20170726 contents Neblio Blockchain 3 4 6 7 14 16 18 19 Abstract Blockchain What is the Neblio Blockchain? Enterprise Adoption & Next Generation

More information

POA Bridge. Security Assessment. Cris Neckar SECUREWARE.IO

POA Bridge. Security Assessment. Cris Neckar SECUREWARE.IO POA Bridge Security Assessment Cris Neckar SECUREWARE.IO Executive Summary The engagement team performed a limited scope, source code assessment of POA Network s POA Bridge. The purpose of this assessment

More information

Token Sale. Participation guide

Token Sale. Participation guide Token Sale Participation guide 2 As the DataBroker DAO token sale is closing in, we want to inform our future participants on how to properly take part in our presale on 19th of March. At first glance,

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

Mobilink-Network Partial List of Partners

Mobilink-Network Partial List of Partners Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the user s phone will

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

Wormhole: A Smart Contract Solution for Bitcoin Cash

Wormhole: A Smart Contract Solution for Bitcoin Cash Wormhole: A Smart Contract Solution for Bitcoin Cash Abstract Born at block height 478,558, Bitcoin Cash (BCH) has been dedicated to bringing a reliable electronic cash to the world and fulfilling Satoshi

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Using Security to Lock in Commercial Banking Customers

Using Security to Lock in Commercial Banking Customers EXECUTIVE SUMMARY Webinar Using Security to Lock in Commercial Banking Customers Commercial banking is a market opportunity that financial institutions (FIs) should not ignore. Tens of billions of dollars

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

DTX Token. Starter guide

DTX Token. Starter guide DTX Token Starter guide 2 Choosing for the DTX token to buy and sell sensor data enables you to perform real microtransactions on DataBroker DAO. Every beginning is difficult, but this step-by-step introduction

More information

Short review of the Coinmama.com. Registration on the Coinmama

Short review of the Coinmama.com. Registration on the Coinmama Short review of the Coinmama.com Coinmama is not an exchange in its' usual sense. Here you can only buy currency, so its' more like a currency exchanger. The platform doesn t have the built-in wallet and

More information

BaFin-Tech 2018 BlockChain & Security (from #developerview)

BaFin-Tech 2018 BlockChain & Security (from #developerview) BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain

More information

INX Tokenomics I

INX Tokenomics I Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.

More information

Synapse: Decentralized Intelligence

Synapse: Decentralized Intelligence Synapse: Decentralized Intelligence A Decentralized Data and Machine Learning Network Dan P. Gailey Version 1.0 Abstract Discusses the architecture and protocol specifications for building the infrastructure

More information

Product Security Program

Product Security Program Product Security Program An overview of Carbon Black s Product Security Program and Practices Copyright 2016 Carbon Black, Inc. All rights reserved. Carbon Black is a registered trademark of Carbon Black,

More information

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose... Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7

More information

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations Visa Inc. 2017 Investor Day Technology at Visa Rajat Taneja EVP, Technology and Operations Key Takeaways Technology is a vital pillar of Visa s business The Visa network is engineered to provide unmatched

More information

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS Topics Consumer identity why it is important How big a problem is identity fraud? What

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Blockchain-enabled peer-to-peer marketplaces

Blockchain-enabled peer-to-peer marketplaces Blockchain-enabled peer-to-peer marketplaces Creating the infrastructure and UX to enable mainstream commercial transactions on Ethereum Matthew Liu Cofounder Company Overview 2 Origin will enable decentralized

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

Client-Server Architecture PlusUltra beyond the Blockchain

Client-Server Architecture PlusUltra beyond the Blockchain 1--------------------------------------------Table of Contents 2--------------------------------------------PlusUltra Single Sign On 3--------------------------------------------Client-Server Architecture

More information

Security Audit of FuzeX Smart Contract This report is public. ChainSecurity Ltd. January 11, 2018

Security Audit of FuzeX Smart Contract This report is public. ChainSecurity Ltd. January 11, 2018 Security Audit of FuzeX Smart Contract This report is public. ChainSecurity Ltd. January 11, 2018 1 Contents 1 System Overview 3 1.1 TGE Overview................................. 4 1.2 Token Rewards.................................

More information

Clarity on Cyber Security. Media conference 29 May 2018

Clarity on Cyber Security. Media conference 29 May 2018 Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

Fraud Detection using Machine Learning

Fraud Detection using Machine Learning Fraud Detection using Machine Learning Aditya Oza - aditya19@stanford.edu Abstract Recent research has shown that machine learning techniques have been applied very effectively to the problem of payments

More information

Endpoint Security for Wholesale Payments

Endpoint Security for Wholesale Payments Endpoint Security for Wholesale Payments 2018 CHICAGO PAYMENTS SYMPOSIUM EMILY CARON MANAGER, FMI RISK & POLICY FEDERAL RESERVE BOARD The views expressed in this presentation are those of the speaker and

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

Untraceable Nym Creation on the Freedom 2.0 Network

Untraceable Nym Creation on the Freedom 2.0 Network Russell Samuels Ed Hawco November 1, 2000 Untraceable Nym Creation on the Freedom 2.0 Network Version 2.0 This whitepaper, targeted at users with a basic understanding of Freedom, describes the Freedom

More information

A SYSTEM FOR ENABLING SHORT-TERM FINANCING

A SYSTEM FOR ENABLING SHORT-TERM FINANCING A SYSTEM FOR ENABLING SHORT-TERM FINANCING 5 The present invention relates generally to a system and method for enabling short-term financing, and finds particular, although not exclusive, utility in invoice

More information

How to buy LIVE Token with Ethereum and Bitcoin step by step

How to buy LIVE Token with Ethereum and Bitcoin step by step How to buy LIVE Token with Ethereum and Bitcoin step by step Ethereum Step 1. Create new wallet. Go to https://www.myetherwallet.com/, think of a strong password and enter it here: Click the button Create

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

NEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements

NEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements WHITEPAPER Version 1.1 May 1, 2018 Contents of the white paper are subject to changes and improvements ABSTRACT The Fourth Industrial revolution brings the implementation of such technologies like Big

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event. 1 Disclaimer 2. 2 What You Will Need 2

FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event. 1 Disclaimer 2. 2 What You Will Need 2 FLIP Token (FLP) How to Participate in the FLIP Token (FLP) Sale Event 1 Disclaimer 2 2 What You Will Need 2 3 Create a New MEW Account 2 Step 1: Go to https://www.myetherwallet.com 3 Step 2: Go to the

More information

TeleX AI. Cryptocurrency Wallet and Exchange Services on Telegram. Telex AI Company Ltd telexai.com November 2017

TeleX AI. Cryptocurrency Wallet and Exchange Services on Telegram. Telex AI Company Ltd telexai.com November 2017 TeleX AI Cryptocurrency Wallet and Exchange Services on Telegram Telex AI Company Ltd telexai.com November 2017 TeleX AI is a chatbot powered by artificial intelligence, designed to provide cryptocurrency-related

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Gateway Bulletin GB Action Recommended New Feature: Ripple Names The New Standard

Gateway Bulletin GB Action Recommended New Feature: Ripple Names The New Standard Gateway Bulletin GB 2014 01 Action Recommended New Feature: Ripple Names The New Standard Updated: August 14, 2014 A version of this bulletin was originally released on April 23, 2014. It has since been

More information

Bob s Repair Contract Audit

Bob s Repair Contract Audit Bob s Repair Contract Audit by Hosho, April 2018 Executive Summary This document outlines the overall security of Bob s Repair smart contract as evaluated by Hosho s Smart Contract auditing team. The scope

More information

Hyperledger Quilt and Interledger Protocol. Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong

Hyperledger Quilt and Interledger Protocol. Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong Hyperledger Quilt and Interledger Protocol Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong Housekeeping Road Map of 2018 - More meet ups! Thank you to our sponsor

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

Cryptocurrencies for Investigators

Cryptocurrencies for Investigators Cryptocurrencies for Investigators By Nick Furneaux CSITech Ltd Course Description Cryptocurrencies in their many forms, based on the blockchain concept, are here to stay and will increasingly pervade

More information

Enjin Coin Yellow Paper

Enjin Coin Yellow Paper Enjin Coin Yellow Paper Q4 2017, Minimum Viable Product (Oct 1 - Dec 31) Version 1.0 - Updated November 2, 2017 This yellow paper outlines Enjin Coin's initial milestones in 2017 and a technical summary

More information

EXECUTIVE PRODUCT SUMMARY

EXECUTIVE PRODUCT SUMMARY Enterprise Blockchain Infrastructure For Decentralized Internet EXECUTIVE PRODUCT SUMMARY August 10 th 2018 A product by Contents Opportunity....1 Introduction.... 2 Solution.... 3 Microservices Oriented

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

MOBILE DEFEND. Powering Robust Mobile Security Solutions

MOBILE DEFEND. Powering Robust Mobile Security Solutions MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

kasko2go Token Contract Audit

kasko2go Token Contract Audit Version 1.0 / 17.04.2018 kasko2go Token Contract Audit inacta AG Eugen Lechner Cédric Walter Index 1. Introduction 2 2. Scope 2 3. Executive Summary

More information

INTRODUCTION WHY DAPS?

INTRODUCTION WHY DAPS? DAPS WHITEPAPER INTRODUCTION DAPS is a planned experimental hybrid fork-swap of Peepcoin, to be conducted in 2018. The goal of DAPS protocol is to create a fully anonymous coin and eventually payment system

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

DisLedger - Distributed Concurrence Ledgers 12 August, 2017

DisLedger - Distributed Concurrence Ledgers  12 August, 2017 DisLedger - Distributed Concurrence Ledgers www.disledger.com info@disledger.com 12 August, 2017 This whitepaper describes DisLedger - Distributed Concurrence Ledgers (patent pending) an architecture for

More information

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note:

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note: SWIFT Response to the Committee on Payments and Market Infrastructures discussion note: Reducing the risk of wholesale payments fraud related to endpoint security 28 November 2017 SWIFT thanks the Committee

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

Who wants to be a millionaire? A class in creating your own cryptocurrency

Who wants to be a millionaire? A class in creating your own cryptocurrency DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION

WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION 2 Web application firewalls (WAFs) entered the security market at the turn of the century as web apps became increasingly

More information

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar Unblockable Chains Is Blockchain the ultimate malicious infrastructure? Omer Zohar #WhoAmI Researching malware backbones for the past decade Following blockchain eco-system since 2013 Finally had some

More information

Rise Technology White Paper

Rise Technology White Paper Rise Technology White Paper Posted in White paper by Justin 1. Introduction 1. What is Rise We are Rise, a Lisk-based currency and distributed application platform heavily emphasizing security and ease

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Transactions as Proof-of-Stake! by Daniel Larimer!

Transactions as Proof-of-Stake! by Daniel Larimer! Transactions as Proof-of-Stake by Daniel Larimer dlarimer@invictus-innovations.com November, 28 th 2013 Abstract The concept behind Proof-of-Stake is that a block chain should be secured by those with

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

Decentralized Database for Developers. White Paper v March 31,2018

Decentralized Database for Developers. White Paper v March 31,2018 Decentralized Database for Developers White Paper v 1.01 March 31,2018 Content Introduction 3 Problem 3 Solution 4 Solutions Landscape 5 The Xuma Benefits 6 Market Opportunity 6 Database Evolution 7 Xuma

More information

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise RANSOMWARE PROTECTION A Best Practices Approach to Securing Your Enterprise TABLE OF CONTENTS Introduction...3 What is Ransomware?...4 Employee Education...5 Vulnerability Patch Management...6 System Backups...7

More information

Public Wallet Interface for Ripple

Public Wallet Interface for Ripple CS 795 Blockchain Technologies CS 795 Authors: May 15, 2017 Contents 1 Abstract 2 2 Introduction 3 3 Program Design Architecture 6 4 Functionality 7 5 Preview 10 6 In-comparison with other wallets 13 7

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

How DDoS Mitigation is about Corporate Social Responsibility

How DDoS Mitigation is about Corporate Social Responsibility How DDoS Mitigation is about Corporate Social Responsibility We see the Network, we monitor the Network and we can protect your business with automatic DDoS mitigation services from our Network core. Regardless

More information

Mobile Cash Management

Mobile Cash Management Mobile Cash Management Best Practices Presented by: Dawn Papadatos Date: April 24, 2017 Agenda I. Current Mobile Banking Landscape II. Benefits of Corporate Mobile Banking III. Mobile Security IV. The

More information

Nokia Conference Call 1Q 2012 Financial Results

Nokia Conference Call 1Q 2012 Financial Results Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

Introducing Cloud Currencies

Introducing Cloud Currencies Introducing Cloud Currencies and the Redundant Array of Independent Detection Agents Sean H. Worthington Department of Computer Science Butte College Oroville, United States of America WorthingtonSe@Butte.edu

More information

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016

Upgrading Bitcoin: Segregated Witness. Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs March-2016 Upgrading Bitcoin: Segregated Witness Dr. Johnson Lau Bitcoin Core Contributor Co-author of Segregated Witness BIPs 141-143 16-March-2016 Topics A short introduction to Bitcoin transactions What is transaction

More information

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science

Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science Technical Brief: Domain Risk Score Proactively uncover threats using DNS and data science 310 Million + Current Domain Names 11 Billion+ Historical Domain Profiles 5 Million+ New Domain Profiles Daily

More information