Categories
Links

The colossal arrogance of Newsweek’s Bitcoin “scoop”

Ars Technica has written one of the better critiques of the Newsweek story which (likely incorrectly) identified the man believed to have invented Bitcoin. It’s worth the read, if only to have the current state of debate over Newsweek’s story nicely summarized.

Source: The colossal arrogance of Newsweek’s Bitcoin “scoop”

Categories
Aside Links

How the Bitcoin protocol actually works

If you’re interested in Bitcoin then this is an absolutely wonderful article. The author has done an exceptional job in explaining how Bitcoin operates by walking you through the steps – and problems – of building a contemporary cryptocurrency. It’s not a short read, but it’s well worth the time.

Categories
Aside Links

A Few Thoughts on Cryptographic Engineering: Zerocoin: making Bitcoin anonymous

Matt Green has a really excellent post on why Bitcoin isn’t as anonymous as people think, and how to ‘fix’ that problem. If this is something that you’re interested in then his (very) detailed writeup (and link to his paper!) is worth the time and effort.

Categories
Links Writing

Bitcoin Malware Emerges

So, in line with my previous writing on why I’m skeptical of digital currencies like Bitcoin, Ars Technica has a piece of the newest malware hitting digital currencies:

In another example of the security mantra of “be careful what you click,” at least one Bitcoin trader has been robbed in a forum “phishing” attack designed specifically to ride the hype around the digital currency. The attack attempts to use Java exploits or fake Adobe updates to install malware, and it’s one of the first targeted attacks aimed at the burgeoning business of Bitcoin exchanges.

(…)

This type of attack is de rigeur in the financial world, according to George Waller, the executive vice president of Strikeforce Technologies, a security software firm specializing in two-factor authentication and anti-keylogging software for the financial industry. “Driving people to a site to download malware is one of the most common attacks today,” he told Ars. “You go to a site from a forum and get prompted for Java or Adobe updates—and in the majority of those updates they drop in a keylogger. Since they’re written to get around antivirus scans, AV software is useless against this sort of pervasive malware today.”

To be clear: such attacks are common against a host of perceived high-value targets. They also, however, underscore the real value in linking names, activity-types, purchase behaviour, and other distinctive characteristics to persons’ online economic activity to defray fraud made possible by malware.