Médias Sociaux Suivant Trois Angles, Soit La Cybersécurité, La Gouvernementalité Algorithmique Et L’Intelligence Artificielle

Total Page:16

File Type:pdf, Size:1020Kb

Médias Sociaux Suivant Trois Angles, Soit La Cybersécurité, La Gouvernementalité Algorithmique Et L’Intelligence Artificielle Ce livre dresse le portrait des médias sociaux suivant trois angles, soit la cybersécurité, la gouvernementalité algorithmique et l’intelligence artificielle. Il révèle les multiples facettes SCHALLUM PIERRE • FEHMI JAAFAR d’un sujet qui ne peut s’appréhender qu’à travers l’interdisciplinarité. Le présent ouvrage est Sous la direction de surtout un guide pour sensibiliser le milieu citoyen aux cyberattaques et aux enjeux liés à la SCHALLUM PIERRE protection des données à caractère personnel. Il s’adresse autant aux personnes expertes en données massives qu’aux institutions privées et publiques qui rédigent des politiques de Sous la direction de FEHMI JAAFAR confidentialité. Nous espérons que les différents chapitres sauront contribuer à faire des médias sociaux un espace et un outil plus respectueux des données citoyennes. MÉDIAS SOCIAUX SCHALLUM PIERRE est chargé scientifique et éthique à l’Institut intelligence et données (IID) de l’Université Laval et professeur à temps partiel de « communications sociales et médias sociaux » PERSPECTIVES SUR LES DÉFIS LIÉS À LA CYBERSÉCURITÉ, à l’Université Saint-Paul. Chercheur en éthique des données massives, il s’intéresse à la question LA GOUVERNEMENTALITÉ ALGORITHMIQUE de l’identité dans ses dimensions technologiques, numériques, anthropologiques, idéologiques et ET L’INTELLIGENCE ARTIFICIELLE historiques. Il est membre du comité de rédaction de la revue Technologie et innovation, membre du Réseau intégré sur la cybersécurité de l’Université de Montréal et membre du comité d’éthique du CHU de Québec-Université Laval. Détenteur d’un doctorat en philosophie de l’Université Laval, il a effectué un stage postdoctoral à Polytechnique Montréal. FEHMI JAAFAR est chercheur au Centre de recherche en Informatique de Montréal (CRIM) et profes- seur adjoint affilié à l’Université Concordia. Il est le Vice-président du comité sur l’Internet des objets et technologies connexes au Conseil canadien des normes. Auparavant, il a été professeur adjoint à l’Université Concordia d’Edmonton, et chercheur postdoctoral à Queen’s University et à Polytechnique Montréal. Après avoir obtenu un doctorat en informatique de l’Université de Montréal, M. Jaafar : PERSPECTIVES SUR LES DÉFIS LIÉS À LA CYBERSÉCURITÉ, s’est spécialisé dans des travaux de recherche en cybersécurité, Il s’intéresse à la cybersécurité dans l’Internet des objets et à l’application des techniques d’apprentissage automatique en cybersécurité. Il a établi des programmes de recherche en collaboration avec Défense Canada, Sécurité publique Canada, le Conseil de recherches en sciences naturelles et en génie du Canada, et des partenaires LA GOUVERNEMENTALITÉ ALGORITHMIQUE ET L’INTELLIGENCE ARTIFICIELLE ALGORITHMIQUE ET L’INTELLIGENCE LA GOUVERNEMENTALITÉ industriels et universitaires canadiens et étrangers. MÉDIAS SOCIAUX Illustration de couverture : iStockphoto Communications ÉTHIQUE IA ET SOCIÉTÉ Collection dirigée par Lyse Langlois ÉTHIQUE IA ET SOCIÉTÉ Collection Presses de l’Université Laval pulaval.com Pierre et Fehmi-5328C.indd 1 21-02-08 09:20 ÉTHIQUE IA ET SOCIÉTÉ Collection dirigée par Lyse Langlois Médias sociaux Perspectives sur les défis liés à la cybersécurité, la gouvernementalité algorithmique et l’intelligence artificielle Médias sociaux Perspectives sur les défis liés à la cybersécurité, la gouvernementalité algorithmique et l’intelligence artificielle Sous la direction de Schallum Pierre et Fehmi Jaafar Nous remercions le Conseil des arts du Canada de son soutien. We acknowledge the support of the Canada Council for the Arts. Les Presses de l’Université Laval reçoivent chaque année de la Société de développe- ment des entreprises culturelles du Québec une aide financière pour l’ensemble de leur programme de publication. Maquette de couverture : Laurie Patry Mise en page : In Situ © Les Presses de l’Université Laval Tous droits réservés. Imprimé au Canada Dépôt légal 4e trimestre 2020 ISBN 978-2-7637-5328-7 PDF 9782763753294 Les Presses de l’Université Laval www.pulaval.com Toute reproduction ou diffusion en tout ou en partie de ce livre par quelque moyen que ce soit est interdite sans l’autorisation écrite des Presses de l’Université Laval. TABLE DES MATIÈRES Introduction .............................................................................................. 1 SCHALLUM PIERRE ET FEHMI JAAFAR 1. Social Network Cyberattacks and Security Issues ........................... 11 FEHMI JAAFAR AND JEAN DECIAN 2. La Sécurité utilisable : Entre l’interaction homme-machine et la sécurité de l’information .......................................................... 23 HERVÉ SAINT-LOUIS 3. Protéger autant nos données que les fondements de la démocratie en privilégiant les logiciels libres ..................................................... 45 MATHIEU GAUTHIER-PILOTE 4. Access Control in Cybersecurity and Social Media .......................... 69 5. Social Media Surveillance : Between Digital Governmentality, Big Data and Computational Social Science ..................................... 107 RAMÓN REICHERT 6. Technique, société et cyberespace : La gouvernementalité algorithmique .................................................................................... 121 MARC MÉNARD ET ANDRÉ MONDOUX 7. The Case of Fake News and Automatic Content Generation in the Era of Big Data and Machine Learning ................................. 139 NICOLAS GARNEAU 8. Protecting Online Communities from Harmful Behaviors ............. 149 MARC-ANDRÉ LAROCHELLE, ÉLOI BRASSARD-GOURDEAU, ZEINEB TRABELSI, RICHARD KHOURY, SEHL MELLOULI, LIZA WOOD, CHRIS PRIEBE 9. Extrémisme violent de droite et médias sociaux : caractéristiques, idéologies, médiatisations et gestions .............................................. 167 SCHALLUM PIERRE La publication du présent livre a été rendue possible grâce à un financement de l’Institut intelligence et données (IID) et du Centre de recherche informatique de Montréal (CRIM). INTRODUCTION Schallum Pierre et Fehmi Jaafar Schallum Pierre est chargé scientifique et éthique à l’Institut intelligence et données (IID) de l’Université Laval et professeur à temps partiel de “communications sociales et médias sociaux ” à l’Université Saint-Paul. Chercheur en éthique des données massives, il s’intéresse à la question de l’identité dans ses dimensions technologiques, numériques, anthropologiques, idéologiques et historiques. Il est membre du comité de rédaction de la revue Technologie et innovation, membre du Réseau intégré sur la cybersécurité de l’Université de Montréal et membre du comité d’éthique du CHU de Québec-Université Laval. Détenteur d’un doctorat en philosophie de l’Université Laval, il a effectué un stage postdoctoral à Polytechnique Montréal. Fehmi Jaafar est chercheur au Centre de recherche en Informatique de Montréal (CRIM) et professeur adjoint affilié à l’Université Concordia. Il est le Vice-président du comité sur l’Internet des objets et technologies connexes au Conseil canadien des normes. Auparavant, il a été professeur adjoint à l’Université Concordia d’Edmonton, et chercheur postdoctoral à Queen’s University et à Polytechnique Montréal. Après avoir obtenu un doctorat en informatique de l’Université de Montréal, M. Jaafar s’est spécialisé dans des travaux de recherche en cybersécurité, Il s’intéresse à la cybersécurité dans l’Internet des objets et à l’application des techniques d’apprentissage automatique en cybersécurité. Il a établi des programmes de recherche en collaboration avec Défense Canada, Sécurité publique Canada, le Conseil de recherches en sciences naturelles et en génie du Canada, et des partenaires industriels et universitaires canadiens et étrangers. 1 2 MÉDIAS SOCIAUX : LES DÉFIS LIÉS À LA CYBERSÉCURITÉ, LA GOUVERNEMENTALITÉ ALGORITHMIQUE ET L’INTELLIGENCE ARTIFICIELLE La cybersécurité dans le contexte des médias sociaux est souvent rattachée à la gestion des risques de l’information. En ce sens, elle réfère à la norme ISO/CEI 27001 :2013(fr) qui préconise la préservation de la confidentialité, de l’intégrité et de la disponibilité de l’information. Le système de management de la sécurité de tout média social est de première importance car il y va de la confiance qui lui sera accordée. Une perte de confiance peut engendrer une baisse de l’utilisation ou de l’adoption d’une plateforme. Elle pourrait même mener à son déclin. Les enjeux de sécurité sont susceptibles d’atteindre non seulement la fréquentation des médias sociaux, mais aussi et surtout, les données personnelles. À ce titre, l’affaire Cambridge Analytica est riche d’enseignement. Les données de 87 millions de personnes ont été collectées, sans l’obtention de leur consentement libre et éclairé, à des fins de désinformation et d’influence idéologique (Isaak et Hanna, 2018). Facebook a été utilisé comme outil de manipulation de l’opinion publique et de propagation à outrance de rumeurs. L’affaire montre les conséquences sur le plan politique d’une exploitation massive des données, portant ainsi une grave atteinte tant à la vie privée qu’à un régime dit démocratique (Barraud, 2018). La cybersécurité peut être causée par des défaillances de procédures organisationnelles et des défaillances technologiques. À propos de Facebook, le site dédié à la cybersécurité, Krebsonsecurity.com révèle les conséquences d’une défaillance de procédures organisationnelles sur des millions d’utilisateurs et d’utilisatrices dont les mots de passe ont été stockés en clair pendant plusieurs années à l’interne (Krebsonsecurity, 2019). En plus des défaillances
Recommended publications
  • Plasma on Mobile Devices
    Plasma on Mobile devices Application Ecosystem MC Bhushan Shah KDE Developer Agenda ● Initial development of the Plasma Mobile ● Basic architecture details ● Advantages to KDE community ● Application ecosystem and development ● Future for Plasma Mobile ● Challenges Introduction ● KDE developer and sysadmin ● Plasma Mobile maintainer and lead developer ● Employed by Bluesystems GmbH ● From Vadodara, India KDE ● Previously known as the K Desktop Environment ● Now community, which creates free software for end users ● Several products including Plasma, KDE Frameworks, KDE applications. Plasma Mobile ● Announced in the July 2015 ● Vision of providing completely free and open-source mobile platform which respects user’s privacy and freedom. ● Initial prototype on the LG Nexus 5. Initial Development ● LGE Nexus 5 as reference device ● Ubuntu Touch 15.04 (vivid) as base system ● Makes use of the Android binary blobs / drivers ● Can also run on the desktop system for development Basic architecture details ● KWin wayland as compositor ● DRM/GBM or hwcomposer backends ● plasmashell and mobile shell package ● QtQuickControls2 and Kirigami for application development Advantages to KDE community ● Several performance improvements ● Better touch input support in applications and shell ● Improvements in Wayland support ● More modular and re-usable user interfaces Application ecosystem and development ● QtQuickControls2 and Kirigami as toolkit ● CMake/QMake as a buildsystem ● Various bundle formats as well as native distribution packaging for the distribution
    [Show full text]
  • Cryptocurrency: the Economics of Money and Selected Policy Issues
    Cryptocurrency: The Economics of Money and Selected Policy Issues Updated April 9, 2020 Congressional Research Service https://crsreports.congress.gov R45427 SUMMARY R45427 Cryptocurrency: The Economics of Money and April 9, 2020 Selected Policy Issues David W. Perkins Cryptocurrencies are digital money in electronic payment systems that generally do not require Specialist in government backing or the involvement of an intermediary, such as a bank. Instead, users of the Macroeconomic Policy system validate payments using certain protocols. Since the 2008 invention of the first cryptocurrency, Bitcoin, cryptocurrencies have proliferated. In recent years, they experienced a rapid increase and subsequent decrease in value. One estimate found that, as of March 2020, there were more than 5,100 different cryptocurrencies worth about $231 billion. Given this rapid growth and volatility, cryptocurrencies have drawn the attention of the public and policymakers. A particularly notable feature of cryptocurrencies is their potential to act as an alternative form of money. Historically, money has either had intrinsic value or derived value from government decree. Using money electronically generally has involved using the private ledgers and systems of at least one trusted intermediary. Cryptocurrencies, by contrast, generally employ user agreement, a network of users, and cryptographic protocols to achieve valid transfers of value. Cryptocurrency users typically use a pseudonymous address to identify each other and a passcode or private key to make changes to a public ledger in order to transfer value between accounts. Other computers in the network validate these transfers. Through this use of blockchain technology, cryptocurrency systems protect their public ledgers of accounts against manipulation, so that users can only send cryptocurrency to which they have access, thus allowing users to make valid transfers without a centralized, trusted intermediary.
    [Show full text]
  • Announcement
    Announcement Total 100 articles, created at 2016-03-15 00:04 1 Five things to expect from Apple's imminent iPhone launch All the rumours about Apple's 21 March launch in one handy place,Hardware,Mobile 2016-03-15 00:03 2KB www.v3.co.uk (2.00/3) Phones,Communications ,Apple,iPhone 2 Microsoft is Ticking People Off with Automatic Windows 10 Upgrades (2.00/3) The Internet community is up in arms at Microsoft pushing out automatic and supposedly unauthorized Windows 10 upgrades. 2016-03-14 17:24 3KB www.maximumpc.com 3 Microsoft to bolster artificial intelligence using Minecraft Not just a blockhead now 2016-03-14 15:54 2KB www.theinquirer.net (2.00/3) 4 Code.org volunteer emails exposed in information leak As a result, a Singaporean firm decided to try and poach a few members. 2016-03-14 12:59 3KB www.zdnet.com (2.00/3) 5 CityFibre CEO Greg Mensch's ambitious plan to bring FTTP to 100 UK towns and cities - and beat BT in the process Firm's £90m acquisition of Kcom in December has made it a force to be reckoned with in the broadband space,Telecoms ,BT 2016-03-15 00:03 749Bytes www.v3.co.uk 6 Microsoft releases 13 security bulletins in latest Patch Tuesday Patch now or be vulnerable as hackers get to work on coding exploits,Security ,Microsoft,patch Tuesday 2016-03-15 00:03 2KB www.theinquirer.net 7 Microsoft accused of bundling new Windows 10 nagware into latest Patch Tuesday updates More Windows 10 nagware being sneaked into Microsoft updates,Operating Systems,Software,Security ,Microsoft,operating system,Windows Update,security,patch Tuesday
    [Show full text]
  • Download Android Os for Phone Open Source Mobile OS Alternatives to Android
    download android os for phone Open Source Mobile OS Alternatives To Android. It’s no exaggeration to say that open source operating systems rule the world of mobile devices. Android is still an open-source project, after all. But, due to the bundle of proprietary software that comes along with Android on consumer devices, many people don’t consider it an open source operating system. So, what are the alternatives to Android? iOS? Maybe, but I am primarily interested in open-source alternatives to Android. I am going to list not one, not two, but several alternatives, Linux-based mobile OSes . Top Open Source alternatives to Android (and iOS) Let’s see what open source mobile operating systems are available. Just to mention, the list is not in any hierarchical or chronological order . 1. Plasma Mobile. A few years back, KDE announced its open source mobile OS, Plasma Mobile. Plasma Mobile is the mobile version of the desktop Plasma user interface, and aims to provide convergence for KDE users. It is being actively developed, and you can even find PinePhone running on Manjaro ARM while using KDE Plasma Mobile UI if you want to get your hands on a smartphone. 2. postmarketOS. PostmarketOS (pmOS for short) is a touch-optimized, pre-configured Alpine Linux with its own packages, which can be installed on smartphones. The idea is to enable a 10-year life cycle for smartphones. You probably already know that, after a few years, Android and iOS stop providing updates for older smartphones. At the same time, you can run Linux on older computers easily.
    [Show full text]
  • A Cryptocurrency Spectrum Short Analysis
    Journal of Risk and Financial Management Review A Cryptocurrency Spectrum Short Analysis 1 2 3 Mircea Constantin S, cheau , Simona Liliana Crăciunescu , Iulia Brici and Monica Violeta Achim 3,* 1 Faculty of Automation, Computers and Electronics, University of Craiova, 200585 Craiova, Romania; [email protected] 2 Simona Liliana Crăciunescu, The Bucharest University of Economic Studies, 010374 Bucharest, Romania; [email protected] 3 Faculty of Economics and Business Administration, Babes, -Bolyai University, 400591 Cluj-Napoca, Romania; [email protected] * Correspondence: [email protected] Received: 30 June 2020; Accepted: 11 August 2020; Published: 17 August 2020 Abstract: Technological development brings about economic changes that affect most citizens, both in developed and undeveloped countries. The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks. Authorities are continuously concerned about ensuring balance, which is, among other things, a prudent attitude. Achieving this goal sometimes requires the development of standards and regulations applicable at the national or global level. This paper attempts to dive deeper into the worldwide operations, related to cryptocurrencies, as part of a general phenomenon, and also expose some of the intersections with cybercrime. Without impeding creativity, implementing suggested proposals must comply with the rules in effect and provide sufficient flexibility for adapting and integrating them. Different segments need to align or reposition, as alteration is only allowed in a positive way. Adopting cryptocurrency decisions should be unitary, based on standard policies. Keywords: cryptocurrencies; fraud; algorithms; correlations; impact; risks; regulation; blockchain 1. Introduction In the area of influence of computer science, the terms undergo rapid mutations, both in sense and interpretability.
    [Show full text]
  • Whitepaper [2], Nakamoto Explains That
    Introduction Since its inception in 2009, Bitcoin [1] and the concept of a blockchain, was developed in response to an inherent flaw in the way transactions were processed on the Internet. In his whitepaper [2], Nakamoto explains that Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model (Nakamoto, 2007) Bitcoin has been rapidly adopted into today’s modern marketplaces. A primary issue with Bitcoin’s rapid adoption is the increase of demand on the original blockchain to handle varying degrees of large transactions. With increased demand comes increased transactional waiting periods, and this has resulted in higher transactional fees in attempts to try and speed-up transaction confirmation times. Official Verge Blackpaper 5.0 2 Table of contents Introduction 2 1.0 Overview 4 1.1 Multi-Algo PoW 4 1.2 Tailored transactional applications 4 1.3 Simple transactions 4 1.4 Stealth transactions 5 1.5 Anon transactions 5 2.0 The Verge Network 6 2.1 TOR Integration 6 2.2 I2P Integration 7 2.3 Electrum 7 2.4 TOR Android 9 3.0 Encrypted Messaging 10 3.1 Message Propagation 11 4.0 Dual-Key Stealth Addressing 12 4.1 Dual-Key Stealth Address Protocol 13 4.2 Key Agreements 14 4.3 The Diffie-Hellman algorithm 14 4.4 Elliptic-Curve Diffie-Hellman (ECDH) 15 4.5 Key Take-aways 17 5.0 Atomic Swaps 18 5.1 What is a Hash Time-Locked Contract (HTLC)? 18 5.2 How do Hash Time-Locked Contracts work? 18 5.3 What are the benefits of HTLC’s? 19 5.4 What are the benefits of Atomic Swaps? 19 5.5 What are the limitations of on-chain Atomic Swaps? 19 5.6 What is the Lightning Network? 19 6.0 Rootstock (RSK) 21 7.0 Ring confidential transactions 24 7.1 Ring Signatures 25 7.2 Pendersen Commitment 25 7.3 Range Proofs 26 Conclusion 26 References 28 Personal Note 30 Official Verge Blackpaper 5.0 3 1.0 Overview The core innovation behind Bitcoin is its decentralized structure.
    [Show full text]
  • Coinbase Explores Crypto ETF (9/6) Coinbase Spoke to Asset Manager Blackrock About Creating a Crypto ETF, Business Insider Reports
    Crypto Week in Review (9/1-9/7) Goldman Sachs CFO Denies Crypto Strategy Shift (9/6) GS CFO Marty Chavez addressed claims from an unsubstantiated report earlier this week that the firm may be delaying previous plans to open a crypto trading desk, calling the report “fake news”. Coinbase Explores Crypto ETF (9/6) Coinbase spoke to asset manager BlackRock about creating a crypto ETF, Business Insider reports. While the current status of the discussions is unclear, BlackRock is said to have “no interest in being a crypto fund issuer,” and SEC approval in the near term remains uncertain. Looking ahead, the Wednesday confirmation of Trump nominee Elad Roisman has the potential to tip the scales towards a more favorable cryptoasset approach. Twitter CEO Comments on Blockchain (9/5) Twitter CEO Jack Dorsey, speaking in a congressional hearing, indicated that blockchain technology could prove useful for “distributed trust and distributed enforcement.” The platform, given its struggles with how best to address fraud, harassment, and other misuse, could be a prime testing ground for decentralized identity solutions. Ripio Facilitates Peer-to-Peer Loans (9/5) Ripio began to facilitate blockchain powered peer-to-peer loans, available to wallet users in Argentina, Mexico, and Brazil. The loans, which utilize the Ripple Credit Network (RCN) token, are funded in RCN and dispensed to users in fiat through a network of local partners. Since all details of the loan and payments are recorded on the Ethereum blockchain, the solution could contribute to wider access to credit for the unbanked. IBM’s Payment Protocol Out of Beta (9/4) Blockchain World Wire, a global blockchain based payments network by IBM, is out of beta, CoinDesk reports.
    [Show full text]
  • Blockchain in Japan
    Blockchain in Japan " 1" Blockchain in Japan " "The impact of Blockchain is huge. Its importance is similar to the emergence of Internet” Ministry of Economy, Trade and Industry of Japan1 1 Japanese Trade Ministry Exploring Blockchain Tech in Study Group, Coindesk 2" Blockchain in Japan " About this report This report has been made by Marta González for the EU-Japan Centre for Industrial Cooperation, a joint venture between the European Commission and the Japanese Ministry of Economy, Trade and Industry (METI). The Centre aims to promote all forms of industrial, trade and investment cooperation between Europe and Japan. For that purpose, it publishes a series of thematic reports designed to support research and policy analysis of EU-Japan economic and industrial issues. To elaborate this report, the author has relied on a wide variety of sources. She reviewed the existing literature, including research papers and press articles, and interviewed a number of Blockchain thought leaders and practitioners to get their views. She also relied on the many insights from the Japanese Blockchain community, including startups, corporation, regulators, associations and developers. Additionally, she accepted an invitation to give a talk1 about the state of Blockchain in Europe, where she also received input and interest from Japanese companies to learn from and cooperate with the EU. She has also received numerous manifestations of interest during the research and writing of the report, from businesses to regulatory bodies, revealing a strong potential for cooperation between Europe and Japan in Blockchain-related matters. THE AUTHOR Marta González is an Economist and Software Developer specialized in FinTech and Blockchain technology.
    [Show full text]
  • Towards Secure Blockchains
    Towards Secure Blockchains Concepts, Requirements, Assessments | EDITORIAL Editorial Blockchain is currently one of the most widely Consequently, the analysis on the following discussed topics in the area of information pages presents blockchain technology in detail technology. This technology for distributed data and extensively studies its aspects relevant to IT storage originated from the cryptocurrency security. It also assesses to what extent blockchain Bitcoin, which became famous especially due to technology is able to achieve the security prop- the record highs its market value attained in 2017. erties ascribed to it and how it may be evaluated Based on its promise of preventing manipulation within the current legal framework. of data on a purely technical level using its decen- tralised structure, offering maximum transpar- This document thus supports developers and ency and replacing intermediaries within business potential users of blockchain solutions in per- processes, many ideas for applying blockchain forming a well-founded assessment of risks technology in fairly different areas have been and in taking IT security into account from the developed in recent years. start. Furthermore, the dynamic development of blockchain technology offers the possibility Politics has also increasingly taken up blockchain of using the results of this analysis as a basis for technology. For instance, the term blockchain is future discussions on both the national and inter- used several times within the coalition agreement national level. With blockchain—as with other of the 19th election period of the German parlia- topics in IT security—the BSI thus strives to shape ment dating from 2018, and the German federal information security for government, business government has set itself the target of developing and society.
    [Show full text]
  • Facilitating Cross-Chain Cryptocurrency Exchanges: an Inquiry Into Blockchain Technology and Interoperability with an Emphasis on Cryptocurrency Arbitrage
    Eastern Michigan University DigitalCommons@EMU Senior Honors Theses & Projects Honors College 2020 Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Samuel Grone Follow this and additional works at: https://commons.emich.edu/honors Part of the Computer Sciences Commons Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Abstract Since the introduction and proliferation of the blockchain-based cryptocurrency Bitcoin, alternative cryptocurrencies also based on blockchain technology have exploded in number. It was once believed that one, or very few, cryptocurrencies would eventually dominate the market and drive out competitors. This assumption, however, was incorrect. Thousands of cryptocurrencies exist concurrently. The vast number of cryptocurrencies leads to a problem—what if the cryptocurrency that an individual possesses does not meet their current needs as well as another cryptocurrency might? The attempt to solve this problem has led to the rise of many cryptocurrency exchanges and exchange schemes. In this paper, we will discuss the motivations for an individual to be interested in exchanging two or more cryptocurrencies by describing and comparing various popular cryptocurrencies with different desirable attributes. While we will discuss these attributes, this paper will give special focus to arbitrage in particular. In addition, we will describe various cryptocurrency exchange schemes and their advantages and disadvantages. Finally, we contribute to the understanding of cryptocurrency exchangeability and interoperability by comparing the historical price data of several cryptocurrencies to determine how often arbitrage has been possible in the past. Degree Type Open Access Senior Honors Thesis Department Computer Science First Advisor Weitian Tong Second Advisor S.
    [Show full text]
  • List of Cryptoassets That Can Be Legally Traded in Indonesia
    List of Cryptoassets That Can Be Legally Traded in Indonesia Approved cryptoassets under Bappebti Regulation No. 7 of 2020 regarding the Stipulation of the List of Cryptoassets that Are Allowed to Be Traded in the Cryptoasset Physical Market. 1. Bitcoin 81. Verge 161. Storm 2. Ethereum 82. Pax gold 162. Vertcoin 3. Tether 83. Matic network 163. Ttc 4. Xrp/ripple 84. Kava 164. Metadium 5. Bitcoin cash 85. Komodo 165. Pumapay 6. Binance coin 86. Steem 166. Nav coin 7. Polkadot 87. Aelf 167. Dmarket 8. Chainlink 88. Fantom 168. Spendcoin 9. Lightcoin 89. Horizen 169. Tael 10. Bitcoin sv 90. Ardor 170. Burst 11. Litecoin 91. Hive 171. Gifto 12. Crypto.com coin 92. Enigma 172. Sentinel protocol 13. Usd coin 93. V. Systems 173. Quantum resistant ledger 14. Eos 94. Z coin 174. Digix gold token 15. Tron 95. Wax 175. Blocknet 16. Cardano 96. Stratis 176. District0x 17. Tezos 97. Ankr 177. Propy 18. Stellar 98. Ark 178. Eminer 19. Neo 99. Syscoin 179. Ost 20. Nem 100. Power ledger 180. Steamdollar 21. Cosmos 101. Stasis euro 181. Particl 22. Wrapped bitcoin 102. Harmony 182. Data 23. Iota 103. Pundi x 183. Sirinlabs 24. Vechain 104. Solve.care 184. Tokenomy 25. Dash 105. Gxchain 185. Digitalnote 26. Ehtereum classic 106. Coti 186. Abyss token 27. Yearn.finance 107. Origin protokol 187. Cake 28. Theta 108. Xinfin network 188. Veriblock 29. Binance usd 109. Btu protocol 189. Hydro 30. Omg network 110. Dad 190. Viberate 31. Maker 111. Orion protocol 191. Rupiahtoken 32. Ontology 112. Cortex 192.
    [Show full text]
  • 2022 Brand Association List
    Last updated: 9/9/21 Brand Association List Below is the list of brands used in the 2022 Tier Assignment Schedule for Washington’s Electronic Product Recycling Program. Brands are associated with the responsible manufacturer. The manufacturers listed are those Ecology has identified as the brand owners of electronic products covered by this program (computers, monitors, laptops, televisions, portable DVD players, and tablets). Is Your Registration Up to Date? • Manufacturers who own additional brands of covered electronic products not currently registered must add those brands to their registration. • Brand owners of covered electronic products that are not on this list must register as a new participant. • Access your registration by going to our webpage for manufacturers and clicking “Submit my annual registration.” If you have questions, please contact Christine Haun at [email protected]. Brand Manufacturer 4th Dimension Computer 4th Dimension Computer Abacus Abacus Office Machines Accuvision QubicaAMF Acer Acer America Corp ADEK ADEK Industrial Computers ADT ADT LLC dba ADT Security Services AEEZO AEEZO AFUNTA Afunta LLC AG Neovo AG Neovo Technology Corp Ainol Shen Zhen Ainol Electronics Co.,Ltd alcatel TCT Mobile, Inc Alcatel one touch TCT Mobile, Inc Alden 3MD Inc. Alienware Dell Computer Corp ALLDAYMALL iGaming Amazon Kindle Amazon.com Services LLC Amazon Kindle Fire Amazon.com Services LLC American Dynamics Sensormatic Electronics LLC Angel Computer Systems Angel Computer Systems Inc AOC Envision Peripherals Inc AOpen Acer America Corp Last updated: 9/9/21 AORUS Gigabyte aoson Shenzhen Luckystar Technology Co., Ltd Apeman APEMAN APEMAN APEMAN APM Localtel Communications Apple Apple ARM Electronics Tri-Ed / Northern Video Distribution Aspect Hitachi America, LTD Digital Solutions Division Aspire Acer America Corp Astro Queo Inspira Technologies LLC Astro Tab Inspira Technologies LLC ASUS Asus Computer International ATOAH SINGREEN INTERNATIONAL CORPORATION LTD ATYME Atyme Corporation, Inc.
    [Show full text]