SlideShare a Scribd company logo
1 of 223
By : ANUPAM TIWARIanupamtiwari@protonmail.com
Indian Technical & Economic Cooperation
Programme
The views expressed in this
presentation are Mere Apne.
Reference to any specific products,
process ,or service do not
necessarily constitute or imply
endorsement, recommendation, or
views of Min of Def or any Govt
All images used are for illustrative
purposes only & Do not
promote any specific product
anupamtiwari@protonmail.com
https://about.me/anupam.tiwari
Ask for a BREAK FROM CLASS, whenever
YOU FEEL SLEEPY
Ask Me Anything, Anytime
The presentation is mostly
technical
How
Many
of you
have
Heard
the term
BLOCKCHAIN
& BITCOIN?
CRYPTOCURRENCY IS AN ATTEMPT
TO BRING BACK A DECENTRALISED
CURRENCY OF PEOPLE, ONE THAT IS NOT
SUBJECT TO INFLATIONARY MOVES BY
A CENTRAL BANK
No
Government
Intervention
Name used by the
unknown person who
designed BITCOIN
and created its
original reference
implementation
SATOSHI
NAKAMOTO
कह ाँ गय ,उसे ढूंढो
AS OF 10TH March 2018
1 BITCOIN IS WORTH
7400$
SOURCE : https://blockchain.info/charts/n-transactions
2 8 0 4 6 7
SOURCE : https://blockchain.info/charts/n-transactions
ANONYMITY
VS
PSEUDONYMITY
Mark TwainSamuel Clemens
public key addresses similar in function to an
email address, are used to send and receive
Bitcoins and record transactions, as opposed
to personally identifying information.
More DETAILS an Investigator
KNOWS about the TECH
ARCHITECTURE, the CLOSER
he gets to CLOSE the CASE
‫كلمتان‬
MATHEMATICALLY LINKED BOGIES
GENESIS BLOCK ie 1st BLOCK
BLOCK 2 BLOCK 3 BLOCK 4 BLOCK 5 BLOCK 6 BLOCK 7 BLOCK 8
Before we dwell into
DETAILS, we will LEARN
and REFRESH some basic
TECHNICAL jargons
FIRST
Hash function takes an input
and returns a fixed-size
alphanumeric string.
MERKLE TREE
SECOND
BASICALLY CHUNKS OF INFO
THAT CAN BE USED TO
MATHEMATICAL
GUARANTEE ABOUT MESSAGES
THIRD
Peer-to-
Peer (P2P)
network is
created when
two or
more PCs are
connected &
share
resources
without
going through a
separate
server
computer
FOURTH
GLOBAL EXCEL SHEET
Distributed Ledger is a Consensus of
Replicated, Shared & Synchronized
digital data geographically spread across
multiple sites & countries
FIFTH
A block is an aggregated set of data
Data is collected and
processed to fit in a
block through a
process called
MINING
Each block could be
identified using a
Cryptographic Hash
Mining is the process
of writing blocks of
Bitcoin transactions
into the ‘The Bitcoin
Blockchain’, and
getting rewarded with
newly created bitcoins
Block will contain a hash
of the previous block, so
that blocks can form a
chain from the first block
ever (known as the
Genesis Block) to the
formed block
FIRST BLOCK : GENESIS
Every 10 minutes, all Bitcoin
transactions taking place are bundled
into a block
These blocks linked through a
timestamp signing, form a
chain (blockchain), which goes
back to the first block ever
created (mined)
The time stamping makes it
impossible to alter any part of it
once the network confirms it
These rules are inbuilt in the
Bitcoin core software, which
every node in the Bitcoin
network runs
Before a new block is added to the
blockchain, the Bitcoin network
has to reach a consensus on
based on predetermined rules
Data in a blockchain is
internally consistent
and immutable
Each block’s hash is
derived from the
contents of the block
Each block refers to
the previous block’s hash,
not a sequential number
Type of Distributed Ledger, comprised
of Unchangeable, Digitally
Recorded Data in packages called
BLOCKS
TAMPER EVIDENT LEDGER
SIXTH
Proof Of Work Is A Piece Of Data
Which Is Difficult To Produce But
Easy For Others To Verify And Which
Satisfies Certain Requirements
Bitcoin Uses
The Hashcash Proof
Of Work System.
PROOF OF WORK
ANUPAM HASH
8cd65c330ce4d0c58a45e676c2d08f0ddca6
c61f3b0a927ade10368d2d5aae6e
0000d1a2ea819ed13742fe7386a34c25bb48e99
b1ba8327c39551f6da5c01f98
NONCE : 61584
Each block is formed by a proof-of-
work algorithms, through which
consensus of this distributed
system could be obtained via the
longest possible chain
https://anders.com/blockchain/blockchain.html
Thus blockchain provides
the basis for the TRUSTLESS
DISTRIBUTED SYSTEM
SEVEN
BITCOIN MINING
A miner performs the
MINING OPERATIONS
ALONE without joining
a pool.
All mined blocks are generated to
the MINER'S CREDIT.
The current hardware’s utilized for the
process of solo mining can deliver an
experience which is more like playing the
lottery, but if you do it right you can exit
with a lot of cash
EIGHT
WALLET is basically
the Bitcoin Equivalent
of a Bank account.
Allows to RECEIVE BITCOINS,
them, and then
SEND them to others
Connected to the Internet
or is online is said to be HOT
Cold Wallets & Hot Wallets
Cold is considered
most Secure &
suitable for Storing
Large Amounts of
bitcoins
Hot is suitable for
Frequently
Accessed funds
COLD implies it is Offline or
Disconnected from the
Internet
Designedto be downloaded
& used on Laptops/PCs
DESKTOPWALLETS
Armory, Multibit, Msigna
and Hiveto mention a FEW
Easyto Access.
Available for Different OS
– Windows, Mac OS and Ubuntu.
MOBILEWALLETS
ONLINEWEBWALLETS
PHYSICALWALLETS
Once they are generated, you
print them out on a piece of
paper
Paper Wallets can
Securely hold your BITCOINS
in Cold Storage form for a
long time
Bitaddress.org
or Blockchain.info
BitcoinQt is the First ever built
bitcoin CLIENT WALLET
BITCOINCLIENTS
WALLETS
Original bitcoin
wallet used by the
Pioneers of the
currency
COMPUTERS installed with these wallets
FORM PART OF THE CORE
NETWORK & have access to all
transactions on the blockchain
HARDWAREWALLETS
PAPERWALLETS
A user for CONDUCTING
TRANSACTIONS utilizing BITCOIN,
he or she must first DOWNLOAD and
setup a BITCOIN WALLET
BITCOIN WALLET can show the
total BALANCE of all BITCOINS it
CONTROLS and let A USER PAY a
specified AMOUNT
‫نقود‬ ‫محفظة‬
WALLET contains a USER’S
PRIVATE KEY, which ALLOWS
FOR THE SPENDING of the
BITCOINS, which are located in
the BLOCK CHAIN
Once wallet is INSTALLED &
CONFIGURED, an ADDRESS
is GENERATED which is
SIMILAR to an E-MAIL or
PHYSICAL ADDRESS
THE LAST BITCOIN
(PROBABLY 21 MILLIONTH COIN)
WILL BE MINED IN THE YEAR
2140
A reward system, in
the form of
a website or app, that
dispenses rewards in
the form of a satoshi,
for visitors to claim in
exchange for
completing
a captcha or task as
described by the
website.
SATOSHI : 1/100th of a Millionth BITCOIN
They DON’T EXIST
ANYWHERE, even
on a hard drive
When we say SOMEONE HAS
BITCOINS & you look at a
PARTICULAR BITCOIN ADDRESS,
there are NO DIGITAL BITCOINS held
AGAINST that ADDRESS
BALANCE of any BITCOIN
address ISN’T HELD at that
ADDRESS; one MUST
RECONSTRUCT it by looking at
the BLOCKCHAIN
DDoS for Bit Coin @DD4BC is an extortionist
group responsible for many bitcoin extortion
campaigns involving DDoS attacks and
ransom demands
Nitrogen Sports is dedicated to its
international userbase and offers
sports betting for dedicated fans
to make some extra side money
When you visit the site, a unique
Bitcoin address is generated
for your use
NITROGEN SPORTS
ONLINE SPORTS BETTING
Operation Pleiades
European Union's law
enforcement agency
investigators from
Europol, Bosnia
,Hezegovina,
Germany, France,
Japan, Romania,
Switzerland, the UK
and the US contributed
in tracking down
the hacking group
DD4BC
More SUCH unknown
currency UPCOMING
Monero, uses the EQUIVALENT OF A
“POST OFFICE BOX” as address to
send and receive Monero.
VIRTUAL P.O. box
instead of actual
address
With BITCOIN, you reveal your real
“home address” in order to send and
receive BITCOIN
Ring signature is a WAY TO MAKE
SURE A TRANSACTION CAN’T BE
TIED BACK to a specific individual
Kovri is a FREE, DECENTRALIZED,
ANONYMITY TECHNOLOGY developed
by Monero
Kovri uses both GARLIC ENCRYPTION
AND GARLIC ROUTING to create a
private, protected overlay-network across
the internet.
Effectively HIDES GEOGRAPHICAL
LOCATION and internet IP address.
CoinJoin is
ANONYMIZATION
method for bitcoin
TRANSACTIONS
“When you want to make a payment,
find someone else who also wants to
make a payment and make a joint
payment together.”
When making a
joint payment,
there is no way
to relate input
and outputs in
one BITCOIN
transaction
Silent Bitcoin (or SBC) is a DIGITAL
VOUCHER CURRENCY 100% backed by
bitcoins.
Means that 1.0 SBC
equals 1.0 BTC.
However the base
units for SBC vouchers
are mBTC, or milli-
bitcoin (0.001 BTC).
When a user spends BTC to a wallet
hash controlled by SilentVault, they
receive in exchange a voucher (a
cryptographically signed XML object) for
the same amount in SBC.
Thereafter THE SBC VOUCHER VALUE
CIRCULATES PRIVATELY OFF-CHAIN
BETWEEN SILENTVAULT WALLETS, until
a holder redeems their SBC voucher for
BTC.
At that point the SBC value is
decirculated, and a BTC spend is made
from SilentVault's reserve to the
address hash designated by the user
who surrendered the voucher.
no one, not even the Tumbler, can link a
payment from its payer to its payee
TumbleBit, a new unidirectional
unlinkable payment hub that is
fully compatible with today’s
Bitcoin protocol.
TumbleBit allows parties to make
fast, anonymous, off-blockchain
payments through an untrusted
intermediary called the Tumbler
But Keep Calm & Trust Forensics
By : ANUPAM TIWARI
EMAIL: anupamtiwari@protonmail.com
BITCOIN ARTIFACTS
Everyone on the NETWORK knows about a
TRANSACTION and THE HISTORY
OF A TRANSACTION can be TRACED
BACK to the point where the BITCOINS
were produced
Conduct a
SEARCH based
on BLOCK
NUMBER,
ADDRESS,
BLOCK HASH,
TRANSACTION
HASH or
PUBLIC KEY
SOURCE : https://blockchain.info/ip-log
1.46 × 10^48 possible
Bitcoin Addresses
that gives every
person on Earth
2.05×10^38 Different
Addresses
Bitcoin Mixer is an Anonymous
Service, that confuses the trails
of Bitcoin transactions.
PROJECT TITANIUM : Main thrust of the European
Union’s Titanium Project is to Monitor blockchains,
deanonymize wallet addresses, surveil dark net
markets, and block terrorists and money launderers.
TITANIUM, which stands for Tools for the Investigation of
Transactions in Underground Markets
Private key of the suspect, they can
search for that particular key on the
Blockchain to Trace the purchases
to other potential Suspects.
investigator has the Bitcoin
BITCOIN FORENSIC ARTIFACT EXAMINATION
Windows 7 Professional
Multibit
Bitcoin-Qt
Bitminter
Basic USB ASIC Bitcoin
Gateway laptop ML6720
120 GB WD hard drive
(4) USB ASIC Mining
drives
USB powered cooling fan
32 GB USB thumb drive
• System Info
• Info about Logged users
• Registry Info
• Remnants of Chats
• Web browsing Activities
• Recent Communications
• Info from Cloud Services
• Decryption Keys for encrypted
volumes mounted
COLLECTION OF BITCOIN ARTIFACTS
Utilizing the data from
344
transactions,
Meiklejohn able to
identify the owners of
more than a million
Bitcoin addresses
Sarah Meiklejohn, a Bitcoin focused
Computer Researcher
Extensive Research
in
Bitcoin Blockchain
Found that by looking
blockchain an
investigator can
uncover who owns a
Bitcoin addresses
2015
“In this paper we show that combining TOR and
BITCOIN creates an ATTACK VECTOR for the
stealthy man-in-the-middle attacks. A LOW-
RESOURCE ATTACKER gain FULL
CONTROL of information flows between all users
who chose to use Bitcoin over TOR. In particular the
attacker CAN LINK TOGETHER USER’S
TRANSACTIONS regardless of pseudonyms used”
Bitcoin transactions occur via a
Network Connection, an investigator
should seize any Physical Object that
can connect to the Internet in addition
to the hard drive
COLLECTION OF BITCOIN ARTIFACTS
anupamtiwari@protonmail.com
https://about.me/anupam.tiwari

More Related Content

What's hot

Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpointdcarro11
 
What is Bitcoin - The Internet of Money
What is Bitcoin - The Internet of MoneyWhat is Bitcoin - The Internet of Money
What is Bitcoin - The Internet of MoneyJuan Aziz
 
Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityEarthsite
 
Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...
Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...
Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...Lovey Jain
 
Bitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesBitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesQuasarVentures
 
Money Is Broken; Its Future Is Not
Money Is Broken; Its Future Is NotMoney Is Broken; Its Future Is Not
Money Is Broken; Its Future Is Notwinklevosscap
 
Introduction to Bitcoin
Introduction to BitcoinIntroduction to Bitcoin
Introduction to Bitcoinashmoran
 
Bitcoin Final Year Seminar Report
Bitcoin Final Year Seminar ReportBitcoin Final Year Seminar Report
Bitcoin Final Year Seminar ReportShantanu Singh
 
Inside Bitcoins_ArdonLukasiewicz
Inside Bitcoins_ArdonLukasiewiczInside Bitcoins_ArdonLukasiewicz
Inside Bitcoins_ArdonLukasiewiczMediabistro
 
Introduction to BitCoin
Introduction to BitCoinIntroduction to BitCoin
Introduction to BitCoinRajesh Kumar
 
Bitcoin and our Decentralized Future
Bitcoin and our Decentralized FutureBitcoin and our Decentralized Future
Bitcoin and our Decentralized FutureJames L. Walpole
 
Bitcoin and Blockchains
Bitcoin and BlockchainsBitcoin and Blockchains
Bitcoin and BlockchainsSam Bowne
 
MONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGY
MONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGYMONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGY
MONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGYHasHim Salim
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationThaboBotha
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology reportShivani Darshan
 
Bitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek MoneyBitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek MoneyFerdinando Maria Ametrano
 

What's hot (20)

Bitcoin secrets unleashed
Bitcoin secrets unleashedBitcoin secrets unleashed
Bitcoin secrets unleashed
 
Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
 
What is Bitcoin - The Internet of Money
What is Bitcoin - The Internet of MoneyWhat is Bitcoin - The Internet of Money
What is Bitcoin - The Internet of Money
 
Bitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The CommunityBitcoin 101: The Currency, The Network, The Community
Bitcoin 101: The Currency, The Network, The Community
 
Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...
Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...
Study on Bitcoin - Technical & Legal Aspects (Presentation at Cyber Cell Gurg...
 
Bitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential OpportunitiesBitcoin - Understanding and Assessing potential Opportunities
Bitcoin - Understanding and Assessing potential Opportunities
 
Money Is Broken; Its Future Is Not
Money Is Broken; Its Future Is NotMoney Is Broken; Its Future Is Not
Money Is Broken; Its Future Is Not
 
Introduction to Bitcoin
Introduction to BitcoinIntroduction to Bitcoin
Introduction to Bitcoin
 
Bitcoin Final Year Seminar Report
Bitcoin Final Year Seminar ReportBitcoin Final Year Seminar Report
Bitcoin Final Year Seminar Report
 
Inside Bitcoins_ArdonLukasiewicz
Inside Bitcoins_ArdonLukasiewiczInside Bitcoins_ArdonLukasiewicz
Inside Bitcoins_ArdonLukasiewicz
 
Introduction to BitCoin
Introduction to BitCoinIntroduction to BitCoin
Introduction to BitCoin
 
Masterclass on Bitcoin, Ethereum & Cryptoassets
Masterclass on Bitcoin, Ethereum & CryptoassetsMasterclass on Bitcoin, Ethereum & Cryptoassets
Masterclass on Bitcoin, Ethereum & Cryptoassets
 
Bitcoin and our Decentralized Future
Bitcoin and our Decentralized FutureBitcoin and our Decentralized Future
Bitcoin and our Decentralized Future
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin and Blockchains
Bitcoin and BlockchainsBitcoin and Blockchains
Bitcoin and Blockchains
 
MONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGY
MONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGYMONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGY
MONEY ,BITCOIN,BLOCKCHAIN TECHNOLOGY
 
Bitcoin history
Bitcoin historyBitcoin history
Bitcoin history
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology report
 
Bitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek MoneyBitcoin and Blockchain Technology: Hayek Money
Bitcoin and Blockchain Technology: Hayek Money
 

Similar to BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME

Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKanupriti
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensicsanupriti
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEanupriti
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)AJSH & Co LLP
 
A primer on Bitcoin Technology
A primer on Bitcoin TechnologyA primer on Bitcoin Technology
A primer on Bitcoin TechnologySebin Benjamin
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overviewanupriti
 
Bitcoin All The Way
Bitcoin All The WayBitcoin All The Way
Bitcoin All The WayAdmin SBS
 
Bitcoin Technology
Bitcoin TechnologyBitcoin Technology
Bitcoin TechnologyRavi Verma
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)Arun Nair
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies anupriti
 
Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Mayuresh Singh
 
Bitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdfBitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdfFranck La Rocca
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxMuskanRath1
 
Bitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencyBitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencySurbhi Jain
 

Similar to BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME (20)

Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
A primer on Bitcoin Technology
A primer on Bitcoin TechnologyA primer on Bitcoin Technology
A primer on Bitcoin Technology
 
Bitcoin technology
Bitcoin technologyBitcoin technology
Bitcoin technology
 
Blockchain
BlockchainBlockchain
Blockchain
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Bitcoin All The Way
Bitcoin All The WayBitcoin All The Way
Bitcoin All The Way
 
BITCOIN GLOSSARY
BITCOIN GLOSSARYBITCOIN GLOSSARY
BITCOIN GLOSSARY
 
Bitcoin Technology
Bitcoin TechnologyBitcoin Technology
Bitcoin Technology
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02
 
Bitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdfBitcoin price today BTC to USD market cap.pdf
Bitcoin price today BTC to USD market cap.pdf
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docx
 
Bitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencyBitcoin:Global Digital Currency
Bitcoin:Global Digital Currency
 

More from anupriti

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itanupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generalsanupriti
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conferenceanupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with exampleanupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Scoreanupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Nowanupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?anupriti
 
Wirelurker
WirelurkerWirelurker
Wirelurkeranupriti
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisationanupriti
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
BIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGESBIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGESanupriti
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Securityanupriti
 
HACKED PC : -I don't care attitude
HACKED PC : -I don't care attitudeHACKED PC : -I don't care attitude
HACKED PC : -I don't care attitudeanupriti
 

More from anupriti (19)

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 
Regin
ReginRegin
Regin
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
BIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGESBIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGES
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Security
 
HACKED PC : -I don't care attitude
HACKED PC : -I don't care attitudeHACKED PC : -I don't care attitude
HACKED PC : -I don't care attitude
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME

  • 1. By : ANUPAM TIWARIanupamtiwari@protonmail.com Indian Technical & Economic Cooperation Programme
  • 2. The views expressed in this presentation are Mere Apne. Reference to any specific products, process ,or service do not necessarily constitute or imply endorsement, recommendation, or views of Min of Def or any Govt All images used are for illustrative purposes only & Do not promote any specific product
  • 4.
  • 5.
  • 6.
  • 7. Ask for a BREAK FROM CLASS, whenever YOU FEEL SLEEPY
  • 9.
  • 10. The presentation is mostly technical
  • 11.
  • 12.
  • 13.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. CRYPTOCURRENCY IS AN ATTEMPT TO BRING BACK A DECENTRALISED CURRENCY OF PEOPLE, ONE THAT IS NOT SUBJECT TO INFLATIONARY MOVES BY A CENTRAL BANK
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Name used by the unknown person who designed BITCOIN and created its original reference implementation SATOSHI NAKAMOTO कह ाँ गय ,उसे ढूंढो
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. AS OF 10TH March 2018 1 BITCOIN IS WORTH 7400$ SOURCE : https://blockchain.info/charts/n-transactions
  • 36. 2 8 0 4 6 7 SOURCE : https://blockchain.info/charts/n-transactions
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. ANONYMITY VS PSEUDONYMITY Mark TwainSamuel Clemens public key addresses similar in function to an email address, are used to send and receive Bitcoins and record transactions, as opposed to personally identifying information.
  • 43.
  • 44.
  • 45. More DETAILS an Investigator KNOWS about the TECH ARCHITECTURE, the CLOSER he gets to CLOSE the CASE
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 52. MATHEMATICALLY LINKED BOGIES GENESIS BLOCK ie 1st BLOCK BLOCK 2 BLOCK 3 BLOCK 4 BLOCK 5 BLOCK 6 BLOCK 7 BLOCK 8
  • 53. Before we dwell into DETAILS, we will LEARN and REFRESH some basic TECHNICAL jargons
  • 54.
  • 55.
  • 56. FIRST
  • 57.
  • 58. Hash function takes an input and returns a fixed-size alphanumeric string.
  • 59.
  • 60.
  • 61.
  • 62.
  • 65.
  • 66.
  • 67.
  • 68. BASICALLY CHUNKS OF INFO THAT CAN BE USED TO MATHEMATICAL GUARANTEE ABOUT MESSAGES
  • 69.
  • 70. THIRD
  • 71.
  • 72.
  • 73. Peer-to- Peer (P2P) network is created when two or more PCs are connected & share resources without going through a separate server computer
  • 76. Distributed Ledger is a Consensus of Replicated, Shared & Synchronized digital data geographically spread across multiple sites & countries
  • 77. FIFTH
  • 78.
  • 79. A block is an aggregated set of data Data is collected and processed to fit in a block through a process called MINING Each block could be identified using a Cryptographic Hash
  • 80. Mining is the process of writing blocks of Bitcoin transactions into the ‘The Bitcoin Blockchain’, and getting rewarded with newly created bitcoins
  • 81. Block will contain a hash of the previous block, so that blocks can form a chain from the first block ever (known as the Genesis Block) to the formed block
  • 82. FIRST BLOCK : GENESIS
  • 83. Every 10 minutes, all Bitcoin transactions taking place are bundled into a block These blocks linked through a timestamp signing, form a chain (blockchain), which goes back to the first block ever created (mined) The time stamping makes it impossible to alter any part of it once the network confirms it
  • 84. These rules are inbuilt in the Bitcoin core software, which every node in the Bitcoin network runs Before a new block is added to the blockchain, the Bitcoin network has to reach a consensus on based on predetermined rules
  • 85. Data in a blockchain is internally consistent and immutable Each block’s hash is derived from the contents of the block Each block refers to the previous block’s hash, not a sequential number
  • 86. Type of Distributed Ledger, comprised of Unchangeable, Digitally Recorded Data in packages called BLOCKS TAMPER EVIDENT LEDGER
  • 87.
  • 88. SIXTH
  • 89.
  • 90.
  • 91. Proof Of Work Is A Piece Of Data Which Is Difficult To Produce But Easy For Others To Verify And Which Satisfies Certain Requirements Bitcoin Uses The Hashcash Proof Of Work System. PROOF OF WORK
  • 93. Each block is formed by a proof-of- work algorithms, through which consensus of this distributed system could be obtained via the longest possible chain
  • 95. Thus blockchain provides the basis for the TRUSTLESS DISTRIBUTED SYSTEM
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102. SEVEN
  • 104.
  • 105. A miner performs the MINING OPERATIONS ALONE without joining a pool. All mined blocks are generated to the MINER'S CREDIT.
  • 106. The current hardware’s utilized for the process of solo mining can deliver an experience which is more like playing the lottery, but if you do it right you can exit with a lot of cash
  • 107.
  • 108.
  • 109. EIGHT
  • 110.
  • 111. WALLET is basically the Bitcoin Equivalent of a Bank account. Allows to RECEIVE BITCOINS, them, and then SEND them to others
  • 112.
  • 113. Connected to the Internet or is online is said to be HOT Cold Wallets & Hot Wallets Cold is considered most Secure & suitable for Storing Large Amounts of bitcoins Hot is suitable for Frequently Accessed funds COLD implies it is Offline or Disconnected from the Internet
  • 114. Designedto be downloaded & used on Laptops/PCs DESKTOPWALLETS Armory, Multibit, Msigna and Hiveto mention a FEW Easyto Access. Available for Different OS – Windows, Mac OS and Ubuntu.
  • 117. PHYSICALWALLETS Once they are generated, you print them out on a piece of paper Paper Wallets can Securely hold your BITCOINS in Cold Storage form for a long time Bitaddress.org or Blockchain.info
  • 118. BitcoinQt is the First ever built bitcoin CLIENT WALLET BITCOINCLIENTS WALLETS Original bitcoin wallet used by the Pioneers of the currency COMPUTERS installed with these wallets FORM PART OF THE CORE NETWORK & have access to all transactions on the blockchain
  • 120.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126. A user for CONDUCTING TRANSACTIONS utilizing BITCOIN, he or she must first DOWNLOAD and setup a BITCOIN WALLET BITCOIN WALLET can show the total BALANCE of all BITCOINS it CONTROLS and let A USER PAY a specified AMOUNT ‫نقود‬ ‫محفظة‬
  • 127. WALLET contains a USER’S PRIVATE KEY, which ALLOWS FOR THE SPENDING of the BITCOINS, which are located in the BLOCK CHAIN Once wallet is INSTALLED & CONFIGURED, an ADDRESS is GENERATED which is SIMILAR to an E-MAIL or PHYSICAL ADDRESS
  • 128.
  • 129.
  • 130. THE LAST BITCOIN (PROBABLY 21 MILLIONTH COIN) WILL BE MINED IN THE YEAR 2140
  • 131.
  • 132. A reward system, in the form of a website or app, that dispenses rewards in the form of a satoshi, for visitors to claim in exchange for completing a captcha or task as described by the website. SATOSHI : 1/100th of a Millionth BITCOIN
  • 133. They DON’T EXIST ANYWHERE, even on a hard drive
  • 134. When we say SOMEONE HAS BITCOINS & you look at a PARTICULAR BITCOIN ADDRESS, there are NO DIGITAL BITCOINS held AGAINST that ADDRESS BALANCE of any BITCOIN address ISN’T HELD at that ADDRESS; one MUST RECONSTRUCT it by looking at the BLOCKCHAIN
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143. DDoS for Bit Coin @DD4BC is an extortionist group responsible for many bitcoin extortion campaigns involving DDoS attacks and ransom demands
  • 144. Nitrogen Sports is dedicated to its international userbase and offers sports betting for dedicated fans to make some extra side money When you visit the site, a unique Bitcoin address is generated for your use
  • 147.
  • 148.
  • 149. Operation Pleiades European Union's law enforcement agency investigators from Europol, Bosnia ,Hezegovina, Germany, France, Japan, Romania, Switzerland, the UK and the US contributed in tracking down the hacking group DD4BC
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169. Monero, uses the EQUIVALENT OF A “POST OFFICE BOX” as address to send and receive Monero. VIRTUAL P.O. box instead of actual address With BITCOIN, you reveal your real “home address” in order to send and receive BITCOIN
  • 170. Ring signature is a WAY TO MAKE SURE A TRANSACTION CAN’T BE TIED BACK to a specific individual
  • 171. Kovri is a FREE, DECENTRALIZED, ANONYMITY TECHNOLOGY developed by Monero Kovri uses both GARLIC ENCRYPTION AND GARLIC ROUTING to create a private, protected overlay-network across the internet. Effectively HIDES GEOGRAPHICAL LOCATION and internet IP address.
  • 172. CoinJoin is ANONYMIZATION method for bitcoin TRANSACTIONS
  • 173. “When you want to make a payment, find someone else who also wants to make a payment and make a joint payment together.” When making a joint payment, there is no way to relate input and outputs in one BITCOIN transaction
  • 174.
  • 175. Silent Bitcoin (or SBC) is a DIGITAL VOUCHER CURRENCY 100% backed by bitcoins. Means that 1.0 SBC equals 1.0 BTC. However the base units for SBC vouchers are mBTC, or milli- bitcoin (0.001 BTC).
  • 176. When a user spends BTC to a wallet hash controlled by SilentVault, they receive in exchange a voucher (a cryptographically signed XML object) for the same amount in SBC.
  • 177. Thereafter THE SBC VOUCHER VALUE CIRCULATES PRIVATELY OFF-CHAIN BETWEEN SILENTVAULT WALLETS, until a holder redeems their SBC voucher for BTC. At that point the SBC value is decirculated, and a BTC spend is made from SilentVault's reserve to the address hash designated by the user who surrendered the voucher.
  • 178.
  • 179. no one, not even the Tumbler, can link a payment from its payer to its payee TumbleBit, a new unidirectional unlinkable payment hub that is fully compatible with today’s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous, off-blockchain payments through an untrusted intermediary called the Tumbler
  • 180.
  • 181.
  • 182.
  • 183. But Keep Calm & Trust Forensics By : ANUPAM TIWARI EMAIL: anupamtiwari@protonmail.com
  • 185. Everyone on the NETWORK knows about a TRANSACTION and THE HISTORY OF A TRANSACTION can be TRACED BACK to the point where the BITCOINS were produced
  • 186. Conduct a SEARCH based on BLOCK NUMBER, ADDRESS, BLOCK HASH, TRANSACTION HASH or PUBLIC KEY
  • 187.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195. 1.46 × 10^48 possible Bitcoin Addresses that gives every person on Earth 2.05×10^38 Different Addresses
  • 196.
  • 197.
  • 198. Bitcoin Mixer is an Anonymous Service, that confuses the trails of Bitcoin transactions.
  • 199.
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207.
  • 208.
  • 209.
  • 210. PROJECT TITANIUM : Main thrust of the European Union’s Titanium Project is to Monitor blockchains, deanonymize wallet addresses, surveil dark net markets, and block terrorists and money launderers. TITANIUM, which stands for Tools for the Investigation of Transactions in Underground Markets
  • 211.
  • 212. Private key of the suspect, they can search for that particular key on the Blockchain to Trace the purchases to other potential Suspects. investigator has the Bitcoin
  • 213.
  • 214. BITCOIN FORENSIC ARTIFACT EXAMINATION Windows 7 Professional Multibit Bitcoin-Qt Bitminter Basic USB ASIC Bitcoin Gateway laptop ML6720 120 GB WD hard drive (4) USB ASIC Mining drives USB powered cooling fan 32 GB USB thumb drive
  • 215. • System Info • Info about Logged users • Registry Info • Remnants of Chats • Web browsing Activities • Recent Communications • Info from Cloud Services • Decryption Keys for encrypted volumes mounted COLLECTION OF BITCOIN ARTIFACTS
  • 216. Utilizing the data from 344 transactions, Meiklejohn able to identify the owners of more than a million Bitcoin addresses Sarah Meiklejohn, a Bitcoin focused Computer Researcher Extensive Research in Bitcoin Blockchain Found that by looking blockchain an investigator can uncover who owns a Bitcoin addresses
  • 217. 2015 “In this paper we show that combining TOR and BITCOIN creates an ATTACK VECTOR for the stealthy man-in-the-middle attacks. A LOW- RESOURCE ATTACKER gain FULL CONTROL of information flows between all users who chose to use Bitcoin over TOR. In particular the attacker CAN LINK TOGETHER USER’S TRANSACTIONS regardless of pseudonyms used”
  • 218. Bitcoin transactions occur via a Network Connection, an investigator should seize any Physical Object that can connect to the Internet in addition to the hard drive COLLECTION OF BITCOIN ARTIFACTS
  • 219.
  • 220.
  • 221.
  • 222.