ICO and Cyber security - How to protect from hackers during ICOsNagib Aouini
Since January 2017, it does not happen a week without a new ICO is launched (more than 200 to date with $ 3Mds raised),
but also without an ICO facing attacks of all kinds (Parity Multi-sig wallet bug with $ 30Mln stolen and
Scam slack/twitter posts and phishing attacks with DNS spoofing, phishing link ...)
During this talk, we will discuss the security principles of an ICO and see how and which elements to protect
in order to secure both IT aspects (server hardening, web application firewall, multi-factor ...) and
processes aspects (governance, mutli-signature procedure, smart-contract ownership, hot / cold keys storage, secret management ...)
Also we will try to give an overview on how to use/secure smart-contract for Token sales and TGE process.
Privacy-preserving techniques using zero knowledge proof in public EthereumNagib Aouini
Public Blockchain technology like Ethereum is gaining interest and growing use case among startup and fintechs.
Apart from scalability issues which are going to be solved with new consensus and mining techniques (Ethereum Metropolis and Bitcoin SegWit2x with Lightning network),
privacy on transaction is still an issue which is not yet fully addressed yet. Because of the public nature of a Ethereum, many businesses are reluctant to deploy Smart-contract or Dapps solutions for fear of exposing confidential or sensitive information.
The use of zk SNARKs (zk-SNARK stands for “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge”) would essentially solve this dilemma (next EIP improvement of Ethereum called 'Byzantium' include zk SNARKS).
The idea of zk-SNARKs is that they allow verification of the correctness of computations, without a verifier having to execute those computations, or even learn what was actually executed. Using zk-SNARKs, a verifier can confirm that a computation happened correctly, with ‘zero-knowledge’ of the computation.
We propose during this talk to have a brief presentation on cryptography and theory around zero-knowledge proof algorithm.
Then we will try to showcase the benefits of zk-SNARKS and other privacy-preserving techniques (like zcash) on the public blockchain ecosystem.
While Bitcoin is often considered the first real use case for blockchain, the technology has come a long way since those early days. Blockchain has been rebuilt from the ground up and is a driving force for new business models and regulated industries. Blockchain is a shared, immutable ledger for recording the history of transactions.
Hackbama Presentation
Presenter: Jason Cuneo
Abstract: The revolution of blockchain centered technologies provides security practitioners with a unique opportunity to participate in shaping the future of secure networking and has the potential to redefine how organizations and society transact and determine value. The objective of this discussion is to introduce how blockchains are disrupting the status quo and how they can be used to improve the Cybersecurity landscape.
ICO and Cyber security - How to protect from hackers during ICOsNagib Aouini
Since January 2017, it does not happen a week without a new ICO is launched (more than 200 to date with $ 3Mds raised),
but also without an ICO facing attacks of all kinds (Parity Multi-sig wallet bug with $ 30Mln stolen and
Scam slack/twitter posts and phishing attacks with DNS spoofing, phishing link ...)
During this talk, we will discuss the security principles of an ICO and see how and which elements to protect
in order to secure both IT aspects (server hardening, web application firewall, multi-factor ...) and
processes aspects (governance, mutli-signature procedure, smart-contract ownership, hot / cold keys storage, secret management ...)
Also we will try to give an overview on how to use/secure smart-contract for Token sales and TGE process.
Privacy-preserving techniques using zero knowledge proof in public EthereumNagib Aouini
Public Blockchain technology like Ethereum is gaining interest and growing use case among startup and fintechs.
Apart from scalability issues which are going to be solved with new consensus and mining techniques (Ethereum Metropolis and Bitcoin SegWit2x with Lightning network),
privacy on transaction is still an issue which is not yet fully addressed yet. Because of the public nature of a Ethereum, many businesses are reluctant to deploy Smart-contract or Dapps solutions for fear of exposing confidential or sensitive information.
The use of zk SNARKs (zk-SNARK stands for “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge”) would essentially solve this dilemma (next EIP improvement of Ethereum called 'Byzantium' include zk SNARKS).
The idea of zk-SNARKs is that they allow verification of the correctness of computations, without a verifier having to execute those computations, or even learn what was actually executed. Using zk-SNARKs, a verifier can confirm that a computation happened correctly, with ‘zero-knowledge’ of the computation.
We propose during this talk to have a brief presentation on cryptography and theory around zero-knowledge proof algorithm.
Then we will try to showcase the benefits of zk-SNARKS and other privacy-preserving techniques (like zcash) on the public blockchain ecosystem.
While Bitcoin is often considered the first real use case for blockchain, the technology has come a long way since those early days. Blockchain has been rebuilt from the ground up and is a driving force for new business models and regulated industries. Blockchain is a shared, immutable ledger for recording the history of transactions.
Hackbama Presentation
Presenter: Jason Cuneo
Abstract: The revolution of blockchain centered technologies provides security practitioners with a unique opportunity to participate in shaping the future of secure networking and has the potential to redefine how organizations and society transact and determine value. The objective of this discussion is to introduce how blockchains are disrupting the status quo and how they can be used to improve the Cybersecurity landscape.
Presentation from Grace Hopper Celebration 2016. Topic: Blockchain and Internet of Things (IoT) in the IBM Bluemix platform includes Demo. Speakers: Valerie Lampkin, Sumabala Nair and Carole Corley
Consensu, Security, and the Blockchain Gateway Interface - Ethan Buchman, Ten...WithTheBest
Introduction of Tendermint consensus engine and programming interface, which allows developers to build distributed applications in any programming language. The Tendermint consensus engine provides optimal fault tolerance against malicious attacks while handling thousands of transactions per second. Get familiar with the background of consensus problem, solutions, while building and run applications utilizing the platform.
Ethan Buchman, Tendermint
At Particl, we’re building an open-source and decentralized privacy platform built on the blockchain specifically designed to work with any cryptocurrency.
Particl's vision is to foster a new decentralized, private and trustless economy supported by its platform and native currency PART.
Blockchain is a specific type of data where you can store information of any kind. Whether small or big, every industry is adopting blockchain technology. This work of organization gets transparent and gets more security to the organization. Sara Technologies provide complete advisory and consulting services worldwide. We have a team of experts who will tell you how blockchain benefits your organization and how it works.
Blockchain is adopted by supply chain, retail, foreign, and many industries coming forward to adopt blockchain technology in their business.
Presentation from Grace Hopper Celebration 2016. Topic: Blockchain and Internet of Things (IoT) in the IBM Bluemix platform includes Demo. Speakers: Valerie Lampkin, Sumabala Nair and Carole Corley
Consensu, Security, and the Blockchain Gateway Interface - Ethan Buchman, Ten...WithTheBest
Introduction of Tendermint consensus engine and programming interface, which allows developers to build distributed applications in any programming language. The Tendermint consensus engine provides optimal fault tolerance against malicious attacks while handling thousands of transactions per second. Get familiar with the background of consensus problem, solutions, while building and run applications utilizing the platform.
Ethan Buchman, Tendermint
At Particl, we’re building an open-source and decentralized privacy platform built on the blockchain specifically designed to work with any cryptocurrency.
Particl's vision is to foster a new decentralized, private and trustless economy supported by its platform and native currency PART.
Blockchain is a specific type of data where you can store information of any kind. Whether small or big, every industry is adopting blockchain technology. This work of organization gets transparent and gets more security to the organization. Sara Technologies provide complete advisory and consulting services worldwide. We have a team of experts who will tell you how blockchain benefits your organization and how it works.
Blockchain is adopted by supply chain, retail, foreign, and many industries coming forward to adopt blockchain technology in their business.
How do you overcome stumbling blocks in your career and turn failures into solutions? This session discusses ways to embrace failure and overcome obstacles on your path to success.
To register for a course, program, or membership. It's on-line and convenient for students and professionals as well. Go to www.rainmakersonline.com and register today!
The Internet has changed our lives and our laws. Technology has put the world at our fingertips and now allows even the smallest business to reach customers around the globe. Because the Internet allows the world to “pass around notes” so quickly, as Jon Stewart joked, it presents a variety of challenges for the law. Courts are often in uncharted waters when deciding disputes that involve the Internet, social media, and online privacy.
Paralegal Power Breaks are short information packed sessions that provide useful career information to paralegals at all career levels.
How to locate the best sources when conducting research.
Register for complimentary webinars and the Paralegal Mastery: Legal Research program by visiting www.rainmakersonline.com.
AITC: White Paper on Distributed Level Of Permission HierarchyRajesh Kumar
Distributed Level Of Permission Hierarchy is process for re-engineering the RBAC implementation based on permission level assigned to individual in any department across organisation.
eDiscovery is a costly and tedious process that requires the adherence to Rules of Civil Procedure and Rules of Evidence. To ensure that the process is handled correctly and to avoid issues that result from errors and the failure to adhere to applicable rules Six Sigma can be implemented during the various eDiscovery phases to reduce errors.
Introduction of Blockchain @ Airtel Payment BankRajesh Kumar
This presentation was delivered in AirtelPaymentBank on 8 Mar 18 for community of developers & beginners. Also, discussed one use-case developed by us on supply-chain.
IoT Pay is Point-of-Sales devices which is connected with blockchain infrastructure. Based on NFC transaction, this PoS enables users to carry money in NFC card or NFC enabled devices to perform transaction in closed loop environment. This product first demonstrated at DCBHackathon on 9 Nov 17 in Pune, India.
This presentation on basics of blockchain technology which I presented in CSI, Special Interest Group SIG, Innovation & Entrepreneurship. This includes fundamentals, explanation of UTXO, blockchain platforms & demo on Bitcoin full node hosted by us.
Concept Presentation on “Connecting To Bottom”Rajesh Kumar
Today, I presented few ideas on delivering healthcare content to rural & remote location to "National Health Portal" Tech Team. This presentation includes few concepts which we are developing in mVirtualHealth and other can be used to broadcast via Radio or set-top box.