Catagora: Shared Library Cataloguing on the Ethereum Blockchain by Kris Joseph a Thesis Submitted in Partial Fulfillment of T

Total Page:16

File Type:pdf, Size:1020Kb

Catagora: Shared Library Cataloguing on the Ethereum Blockchain by Kris Joseph a Thesis Submitted in Partial Fulfillment of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`!,3@*!"**2!+/"4&',*1!3'!+3%.!)5! $%&'!()'*+,A!]a&J&+*1&3!$2)I'!.,*!b34/*!)5!I,3.!.,*!9&"%3%#!K3.34)7!Y)%7*.'A^!!"#"'%$()$*+* !'",,(-(."#(%)*/0"&#1&'2A!@)4/0*!`cdBLefA!++G!DggLDSe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h%3>*!(30&*')2! 321!M&>)43!<&M&>)43['!.&%*4*''!I)%J!321!31@)>3>#!5)%!'./1*2.'!&'!&2@34/3"4*G!83/%**2!Q27*4! +)''*''*'!.,*!%3%*!3"&4&.#!.)!'.%*.>,!3!'./1*2.['!"%3&2!&2!Z/'.!.,*!%&7,.!I3#X!&.!&'!3!"*3/.&5/4! 7&5.G!h*)55%*#!_)>JI*44!*V+%*''*'!*214*''!*2.,/'&3'0!5)%!.,*!I)%J!)5!'./1*2.'!321!&'!3!5)2.! )5!>)44*7&34&.#G!<&2*',!_3.,&!&'!32!*>'.3.&>!'./1*2.!31@&')%!I,)'*!,)4&'.&>!3++%)3>,!.)! 7/&132>*!&'!3!%*54*>.&)2!)5!,&'!*214*''!&2.*44*>./34!%&7)/%G!=3%@*#!i/30*2!&'!32!*V6/&'&.*! 321!6/&*.!34>,*0&'.!I,)!5)%7*'!%&>,!'>,)43%',&+!&2!.,*!',3%*1!>3@*%2'!)5!.*>,2)4)7#!321! .,*!3%.'G!-21!8&>,3*4!8>M344#['!+%)5)/21!&0+3>.!)2!0*!'&.'!"*.I&V.!0#!1**+!+3''&)2'! 3")/.!])+*22*''^!321!0#!@3'.!1*1&>3.&)2!.)!+/"4&>!'>,)43%',&+G!]U%)5)/21A^!]1**+A^!321! ]@3'.^!3%*!344!'#2)2#0'!5)%!]3"#'034G^! :!I)/41!4&J*!.)!.,32J!0#!,/'"321A!h3%%&>J!R/%%)2A!5)%!.,*!*0).&)234!321!+,#'&>34! '/++)%.!.,3.!,3'!'/'.3&2*1!0*!.,%)/7,!.,%**!#*3%'!)5!,3%1!I)%JA!1*'+&.*!0#!>)25/'*1! I321*%&27!.,%)/7,!.,*!13%J!@344*#'!)5!I)%JP4&5*!"3432>*!321!0#!)>>3'&)234!'.)%0'!)5! &%%&.3"&4&.#!321!1*+%*''&)2G!j)/!3%*!0#!%)>JG! H,&'!I)%J!&'!7%3>&)/'4#!'/++)%.*1!"#!.,*!;)>&34!;>&*2>*'!321!=/032&.&*'!_*'*3%>,! K)/2>&4G! ! K3.37)%3O!;,3%*1!9&"%3%#!K3.34)7/&27!)2!.,*!Q.,*%*/0!R4)>J>,3&2! @&&! ! ( !%3#+3#:( DG! :2.%)1/>.&)2!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!D! BG! R3>J7%)/21O!!_327323.,32['!Y&@*!93I'!321!8)1*%2!;,3%*1!K3.34)7/&27!GGGGGGGGGGGGG!c! \2*O!R))J'!3%*!5)%!/'*!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!E! HI)!321!H,%**O!Q@*%#!%*31*%!,&'!"))JA!321!*@*%#!"))J!&.'!%*31*%!GGGGGGGGGGGGGGGGGGGGGGGGGGGGG!D`! Y)/%O!;3@*!.,*!.&0*!)5!.,*!%*31*%!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!DE! Y&@*O!-!4&"%3%#!&'!3!7%)I&27!)%732&'0!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!BB! -!+)''&"4*!5/./%*!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!Bg! eG! 9&.*%3./%*!_*@&*I!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!BE! NG! <*'&72!Y%30*I)%J!5)%!3!M*I!;,3%*1!K3.34)7/*!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!ec! <*>*2.%34&T3.&)2!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!eE! Q.,*%*/0!5)/213.&)2'!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!`C! \+*2!')/%>*!')5.I3%*!321!')>&34!&25)%03.&)2!+%)1/>.&)2!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!gS! H,*!5%30*I)%J!@*%'/'!.,*!0)1*%2!',3%*1!>3.34)7/*!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!SD! `G! H,*!K3.37)%3!;)5.I3%*!<*'&72!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!Se! :2.%)1/>.&)2!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!Se! K)2'.%3&2.'!&0+)'*1!"#!Q.,*%*/0!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!SN! ;#'.*0!-%>,&.*>./%*!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!EC! ;#'.*0!_*6/&%*0*2.'!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!E`! K3.37)%3O!;,3%*1!9&"%3%#!K3.34)7/&27!)2!.,*!Q.,*%*/0!R4)>J>,3&2! @&&&! $*#!1*'&72!>,3%3>.*%&'.&>'!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!DCS! -!2*I!*27&2*!5)%!.,*!>3.34)7/*!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!DBe! gG! <&'>/''&)2!321!M*V.!;.*+'!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!DB`! _*./%2&27!.)!_327323.,32!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!DB`! Q2@&'&)2&27!3!K3.37)%3!&0+4*0*2.3.&)2O!4*'')2'!5%)0!).,*%!&2&.&3.&@*'!GGGGGGGGGGGGGGGG!DBE! M*V.!;.*+'!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!Deg! cG! K)2>4/'&)2!GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG!DNB!
Recommended publications
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • Implementation of Smart Contracts for Blockchain Based Iot Applications
    Implementation of smart contracts for blockchain based IoT applications Georgios Papadodimas, Georgios Palaiokrasas, Antoniοs Litke, Theodora Varvarigou Electrical and Computer Engineering Department National Technical University of Athens Athens, Greece [email protected], [email protected], [email protected], [email protected] Abstract—An increasing number of people, organizations [11], funding mechanisms [12] and many more. A milestone and corporations are expressing their interest in the for the course of blockchain technology was the development decentralization technology of the blockchain. The creation of of Ethereum project, offering new solutions by enabling smart the blockchain marks the time when we start building contracts’ implementation and execution. The Ethereum distributed peer-to-peer networks consisting of non-trusting blockchain is a Turing complete platform for executing smart members that interact with each other without a trusted contracts [13], [14], and not just a ledger serving financial intermediary but in a verifiable manner. In this paper, we transactions. It is a suite of tools and protocols for the creation propose a decentralized application (DApp) based on and operation of Decentralized Applications (DApps), blockchain technology for sharing Internet of Things (IoT) “applications that run exactly as programmed without any sensors’ data, and demonstrate various challenges addressed possibility of downtime, censorship, fraud or third-party during the development process. This application combines blockchain technology with IoT and operates through smart interference”. It also supports a contract-oriented, high-level, contracts that are executed on the Ethereum blockchain. More Turing-complete programming language [15], allowing specifically the application is a platform for sharing (buying and anyone to write smart contracts and create DApps.
    [Show full text]
  • Versus Decentralized Prediction Markets for Financial Assets
    Wolfgang Pacher Centralized- versus Decentralized Prediction Markets for Financial Assets Are blockchain-based prediction market applications simply the better solution to forecasting financial assets? MASTER THESIS submitted in fulfilment of the requirements for the degree of Master of Science Programme: Master's programme Applied Business Administration Branch of study: General Management Alpen-Adria-Universität Klagenfurt Evaluator Assoc.Prof.Mag.Dr. Alexander Brauneis Alpen-Adria-Universität Klagenfurt Institut für Finanzmanagement Klagenfurt, May 2019 Affidavit I hereby declare in lieu of an oath that - the submitted academic paper is entirely my own work and that no auxiliary materials have been used other than those indicated, - I have fully disclosed all assistance received from third parties during the process of writing the thesis, including any significant advice from supervisors, - any contents taken from the works of third parties or my own works that have been included either literally or in spirit have been appropriately marked and the respective source of the information has been clearly identified with precise bibliographical references (e.g. in footnotes), - to date, I have not submitted this paper to an examining authority either in Austria or abroad and that - when passing on copies of the academic thesis (e.g. in bound, printed or digital form), I will ensure that each copy is fully consistent with the submitted digital version. I understand that the digital version of the academic thesis submitted will be used for the purpose of conducting a plagiarism assessment. I am aware that a declaration contrary to the facts will have legal consequences. Wolfgang Pacher m.p.
    [Show full text]
  • Metamask Pre-Assignment
    MMS 562F: Tech Driven Transformation MetaMask Pre-Assignment Campbell R. Harvey Duke University and NBER February 2021 Setup • Metamask is a cryptocurrency wallet that is used to interface with the Ethereum-based Apps • We will be setting up this Wallet on your mobile device (iOS or Android only) – If you are unable to use a mobile device, the end of this deck has a web browser tutorial (Page 19) – If you already have MetaMask on your browser, the end of this deck has a tutorial to link your Web Account to the Mobile App (Page 25) Campbell R. Harvey 2021 2 Setup • Download the Metamask app from the App Store or Google Play Store • Click Get Started • Click Create a new wallet • Create a new account by typing in a password of your choosing and pressing “Create” • Go through the prompts to secure your wallet • Store Secret Backup Phrase in a secure location, ideally paper or a password manager – not on your phone or computer. • Type in secret backup phrase Campbell R. Harvey 2021 3 1 Using MetaMask 1. Network • This determines which Ethereum Network you are using. Click on this to see all network options in a 2 dropdown. For this class we will only discuss or use the Main Ethereum Network and the Ropsten Test Network. 3 Campbell R. Harvey 2021 4 1 Using MetaMask 1. Network • The Ethereum Mainnet is where live ether (ETH) with real value exists and is 2 used for payment and applications. I will refer to this as the “main network” or the “mainnet” 3 Campbell R.
    [Show full text]
  • Steem an Incentivized, Blockchain-Based Social Media Platform
    Steem An incentivized, blockchain-based social media platform. Daniel Larimer, Ned Scott, Valentine Zavgorodnev, Benjamin Johnson, James Calfee, Michael Vandeberg March 2016 Abstract Steem is a blockchain database that supports community building and social interaction with cryptocurrency rewards. Steem combines concepts from social media with lessons learned from building cryptocurrencies and their communities. An important key to inspiring participation in any community, currency or free market economy is a fair accounting system that consistently reflects each person's contribution. Steem is the first cryptocurrency that attempts to accurately and transparently reward an unbounded number of individuals who make subjective contributions to its community. ​ ​ ​ ​ 2 of 44 Table of Contents Abstract Table of Contents Introduction Recognizing Contribution Ways to Contribute Capital Contributions Steem (STEEM) ​ ​ Steem Power (SP) Steem Dollars (SMD) Minimizing Fraudulent Feeds Mitigating Timing Attacks Minimizing Abuse of Conversions Liquidity Sustainable Debt to Ownership Ratios Interest Setting Price Feeds Subjective Contributions Distributing Currency Voting on Distribution of Currency Voting Collusion The Story of the Crab Bucket Rate Limited Voting Delayed Payouts Payout Distribution Rewarding Parent Posts Payouts Consensus Algorithm Consensus in Steem Mining in Steem Mining Rewards require Steem Power ​ Mining Algorithm Botnet Resistant Mining Pool Resistant Eliminating Transaction Fees The Problem With Fees Micropayments Don’t Work Fees are a Barrier to Entry Changing Fees Sybil Attacks Full Reserve vs Fractional Reserve 3 of 44 Iterating Beyond Micropayments Example Implementation Case Study: Bitcoin Impact of Capacity Maximum Number of Unique Users Comparison to Fees Account Creation Justifying Minimum Balances Adjusting the Reserve Ratio Effectiveness Relative to Fees Renting vs.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Blockchain Based Daily Pixel Art Competition
    The Blockchain Based Daily Pixel Art Competition Bachelor Thesis Kees Fani Manuel Borba da Silva Falcão Ferreira Pavel Hoogland 25/06/2018 TU Coach: Dr. Ir. Rafael Bidarra Client adviser: MSc. Marco van Etten Coordinator: Dr. Ir. Otto Visser 1 Table of Contents Table of Contents 1 PREFACE 8 Summary 9 Introduction 10 Blockchain Developments 10 New possibilities 10 Client and Supervision 11 Structure 12 Problem Definition 13 Decentralized vs Centralized 13 Conflicts in Gaming 13 Creation of a Blockchain Game 14 Problem Analysis 15 Cost of Centralization 15 Persistent Games 15 Other Benefits of Decentralization 16 Challenges of the Problem 16 Blockchain 17 Bitcoin 17 Mining 18 Ethereum and Smart Contracts 18 Flaws and possible solutions 18 Mining pools 18 Bitcoin Scalability 19 Proof of Stake 19 Steem & EOS 20 Steem 20 Delegated Proof of Stake 20 EOS 21 Current Activity 22 2 Game Design Phase 24 Client Requirements 24 Search-Space Reduction 25 No fast-paced games 25 No games relying on asymmetric information 25 No games relying on randomness 25 Game must rely on a token 25 Casual gameplay 25 No Complex games 25 Search-Space Exploration 26 Deposit Based Play 26 Collaborative Content Creation 26 Deathmatch Free For All 26 Turn Based Strategy 26 Category Elimination 27 Deposit Based Play 27 Deathmatch Free For All 27 Turn based strategy 27 Collaborative Content Creation 27 Search-Space Exploitation 28 Collaborative Music Creation 28 Collaborative Sculpting 28 Collaborative Drawing 28 Our Preference 28 Refined Game Concept 29 Drawing Mechanism
    [Show full text]
  • Decentralized Reputation Model and Trust Framework Blockchain and Smart Contracts
    IT 18 062 Examensarbete 30 hp December 2018 Decentralized Reputation Model and Trust Framework Blockchain and Smart contracts Sujata Tamang Institutionen för informationsteknologi Department of Information Technology Abstract Decentralized Reputation Model and Trust Framework: Blockchain and Smart contracts Sujata Tamang Teknisk- naturvetenskaplig fakultet UTH-enheten Blockchain technology is being researched in diverse domains for its ability to provide distributed, decentralized and time-stamped Besöksadress: transactions. It is attributed to by its fault-tolerant and zero- Ångströmlaboratoriet Lägerhyddsvägen 1 downtime characteristics with methods to ensure records of immutable Hus 4, Plan 0 data such that its modification is computationally infeasible. Trust frameworks and reputation models of an online interaction system are Postadress: responsible for providing enough information (e.g., in the form of Box 536 751 21 Uppsala trust score) to infer the trustworthiness of interacting entities. The risk of failure or probability of success when interacting with an Telefon: entity relies on the information provided by the reputation system. 018 – 471 30 03 Thus, it is crucial to have an accurate, reliable and immutable trust Telefax: score assigned by the reputation system. The centralized nature of 018 – 471 30 00 current trust systems, however, leaves the valuable information as such prone to both external and internal attacks. This master's thesis Hemsida: project, therefore, studies the use of blockchain technology as an http://www.teknat.uu.se/student infrastructure for an online interaction system that can guarantee a reliable and immutable trust score. It proposes a system of smart contracts that specify the logic for interactions and models trust among pseudonymous identities of the system.
    [Show full text]
  • Makoto Yano Chris Dai Kenichi Masuda Yoshio Kishimoto Editors
    Economics, Law, and Institutions in Asia Pacific Makoto Yano Chris Dai Kenichi Masuda Yoshio Kishimoto Editors Blockchain and Crypto Currency Building a High Quality Marketplace for Crypto Data Economics, Law, and Institutions in Asia Pacific Series Editor Makoto Yano, Research Institute of Economy, Trade and Industry (RIETI), Tokyo, Japan The Asia Pacific region is expected to steadily enhance its economic and political presence in the world during the twenty-first century. At the same time, many serious economic and political issues remain unresolved in the region. To further academic enquiry and enhance readers’ understanding about this vibrant region, the present series, Economics, Law, and Institutions in Asia Pacific, aims to present cutting-edge research on the Asia Pacific region and its relationship with the rest of the world. For countries in this region to achieve robust economic growth, it is of foremost importance that they improve the quality of their markets, as history shows that healthy economic growth cannot be achieved without high-quality markets. High-quality markets can be established and maintained only under a well-designed set of rules and laws, without which competition will not flourish. Based on these principles, this series places a special focus on economic, business, legal, and institutional issues geared towards the healthy development of Asia Pacific markets. The series considers book proposals for scientific research, either theoretical or empirical, that is related to the theme of improving market quality and has policy implications for the Asia Pacific region. The types of books that will be considered for publication include research monographs as well as relevant proceedings.
    [Show full text]
  • CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility
    CRYPTO CURRENCY Technical Competence & Rules of Professional Responsibility Marc J. Randazza Rule 1.1 Comment 8 To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Crypto Currency 1. What is Crypto Currency? 2. How does it work? 3. How could you screw this up? Blockchain •Decentralized •Transparent •Immutable Blockchain Blockchain • Time-stamped series of immutable records of data • Managed by a cluster of de-centralized computers • Each block is secured and bound to another, cryptographically • Shared • Immutable • Open for all to see – how you keep it honest Blockchain Blockchain • Transparent but also pseudonymous • If you look on the ledger, you will not see “Darren sent 1 BTC to Trixie” • Instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC” • But, if you know someone’s wallet ID, you could trace their transactions Crypto Roller Coaster – 5 years Crypto Roller Coaster – 1 day How can you screw this up? Quadriga You can lose it & Bankruptcy Your mind • C$190 million turned to digital dust • Thrown away with no back up • Death of CEO turned death of • $127 million in the trash – gone business • 7,500 BTC – Fluctuates WILDLY Ethical Considerations You might be surprised at what violates Rule 1.8 Which Rules? Rule 1.2 (d) – Criminal or Fraudulent Activity Rule 1.5 (a) – Reasonable Fee Rule 1.6 – Confidentiality Rule 1.8 (a) – Business Dealings With Clients Rule 1.8(f) – Compensation From Other Than Your Client Rule 1.15 (a) – Safekeeping Property Rule 1.15 (c) – Trust Accounts Rule 1.2(d) – Criminal or Fraudulent Activity • Crypto *can* be used for criminal activity • Tends to be difficult, but not A lawyer shall not ..
    [Show full text]
  • BRKSEC-2011.Pdf
    #CLUS About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 #CLUS Me… CCIE Security #14390, CISSP & Motorboat driving license… Working in Content Security & TLS Security tmayer{at}cisco.com Writing stuff at “blogs.cisco.com” #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Agenda • Why anonymization? • Using Tor (Onion Routing) • How Tor works • Introduction to Onion Routing • Obfuscation within Tor • Domain Fronting • Detect Tor • I2P – Invisible Internet Project • Introduction to Garlic Routing • Conclusion #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2011 by the speaker until June 18, 2018. #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Different Intentions Hide me from Government! Hide me from ISP! Hide me from tracking! Bypass Corporate Bypass Country Access Hidden policies restrictions (Videos…) Services #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Browser Identity Tracking does not require a “Name” Tracking is done by examining parameters your browser reveals https://panopticlick.eff.org #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Proxies EPIC Browser #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates.
    [Show full text]
  • People's Tech Movement to Kick Big Tech out of Africa Could Form a Critical Part of the Global Protests Against the Enduring Legacy of Racism and Colonialism
    CONTENTS Acronyms ................................................................................................................................................ 1 1 Introduction: The Rise of Digital Colonialism and Surveillance Capitalism ..................... 2 2 Threat Modeling .......................................................................................................................... 8 3 The Basics of Information Security and Software ............................................................... 10 4 Mobile Phones: Talking and Texting ...................................................................................... 14 5 Web Browsing ............................................................................................................................ 18 6 Searching the Web .................................................................................................................... 23 7 Sharing Data Safely ................................................................................................................... 25 8 Email Encryption ....................................................................................................................... 28 9 Video Chat ................................................................................................................................... 31 10 Online Document Collaboration ............................................................................................ 34 11 Protecting Your Data ................................................................................................................
    [Show full text]