What’s Next For Bitcoin
In February 1637, a single tulip bulb sold for more than 10 times the annual income of a skilled craftsman. Very shortly after the peak, the price collapsed dramatically. The build up became known as tulip mania. An article in the “Quarterly Journal of Austrian Economics” used the term to refer to large economic bubbles […]
College Students See Blockchain Voting In Their Future
Kaspersky Lab, a global cybersecurity company based in Massachusetts and the U.K., hosted a competition for college students interested in Internet voting. The motivation was in part due to recent concerns of rigged or hacked voting. Approximately 20 colleges across the U.S. and U.K. took part. A team from New York University took first place with a solution blending old […]
Congressional Group Agrees With Apple On Encryption
The Verge reported this week about the year-end-report published by the House Judiciary Committee’s Encryption Working Group. Apple and other tech companies will be pleased with the report. It acknowledges requiring a backdoor to assist law enforcement would weaken overall security. Law enforcement officials have maintained they need a backdoor to allow them to get into encrypted devices. […]
Privacy And Trust – Epilogue
Another dimension of Trust has to do with standards. Because of standards, the Internet is the only thing I know of that works the same everywhere. Most things work differently in different parts of the world. The side of the road we drive on, the side of the car we drive from, the width of […]
Privacy And Trust – Part 8
In “Too Secure?”, I described how a financial services company insisted that I use the fax machine to send them a document. Let’s contrast that process with how it might have worked using a public key infrastructure approach with the five security functions described in the last part of the Privacy And Trust series. We’ll […]