Search Results for "ip"
Zcash Bug Could Leak Full Nodes with Shielded IP Addresses
Duke Leto, a core developer at Komodo (KMD), recently published a blog on his personal website revealing that, “A bug has existed for all shielded address since the inception of Zcash and Zcash Protocol.” Leto explained, “That is, Alice giving Bob a zaddr to be paid, could actually allow Bob to discover Alice’s IP address. This is drastically against the design of Zcash Protocol.”
White House Cracks Down on Cryptos Used for Purchasing Illicit Drugs
The White House issued two advisories on illicit drug purchases in the United States on Wednesday, referencing the role of cryptocurrencies allegedly used in these transactions.
How Blockchain Can Help with Vaccine Development Amid Coronavirus Pandemic
The need of the hour to combat the pandemic is a potent vaccine which needs to be available in a short span of time, yet developed by following rigorous regulatory procedures and in a trustworthy manner. How can technologies like Blockchain help in such an accelerated vaccine development process?
Italian Authorities Bust Illegal Ethereum Mining Activities Using Airport Computers
Airport officials working at Italy’s Lamezia Terme International airport have nabbed a 41-year-old technician for unlawfully mining Ethereum using the airport computers.
Blockchain Interoperability—What are the Key Drivers?
Blockchain Interoperability, the ability to connect different blockchain ecosystems, is gaining a lot of traction today. But, first of all, it is necessary to understand if we need interoperable blockchains. What problems do they solve? Or will they create more troubles? And finally, what are the various challenges involved in going down the path of interconnecting blockchains?
American Teen Arrested and Accused as Ringleader of Twitter Scam Involving Bitcoin
Graham Ivan Clark, a 17-year-old from Tampa, Florida, has been arrested and accused of being the mastermind behind the Twitter hack that reaped at least $100,000 in Bitcoin from victims in a matter of hours.
How Do Hackers Use Excel Files to Compromise Your Computers?
We do not recommend users to open excel (especially excel files among other office format files) from an unknown source. Hacker can gain full control of your computer, including the access of all files, screenshots, your web camera and all information typed by your keyboard!
