Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies was held at G D Goenka University, Sohna Road,Gurgaon on 22nd Feb 2018.Sharing here the presentation I gave for info.Readers may contact me for any clarifications on the subject content please.
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Blockchain , Deploying your first smart contract to azure ethereum blockchain.
Slides from my session in "Global Azure Bootcamp Chandigarh"
Presentation starts with basic terms like transactions , ledger and contracts. Talks about what is blockchain and ethereum and concludes with deployment of a smart contract to azure ethereum blockchain.
Where we explain how the concept of a crypto currency can lead to the creation of a new kind of autonomous corporation. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
Bitcoin, Blockchain and the Crypto Contracts - Part 2Prithwis Mukerjee
Where we explain how the cryptographic ideas are used to create a crypto asset on the block chain. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
Blockchain , Deploying your first smart contract to azure ethereum blockchain.
Slides from my session in "Global Azure Bootcamp Chandigarh"
Presentation starts with basic terms like transactions , ledger and contracts. Talks about what is blockchain and ethereum and concludes with deployment of a smart contract to azure ethereum blockchain.
Where we explain how the concept of a crypto currency can lead to the creation of a new kind of autonomous corporation. This one part of a three part slide deck. For the full deck and the context please visit http://bit.ly/pm-bbc
At a very high level, the Blockchain is a decentralized ledger, or list, of all transactions across a peer-to-peer network. This is the technology underlying Bitcoin and other cryptocurrencies, and it has the potential to disrupt a wide variety of business processes.
A short seminar presentation on the technical background of Bitcoins. Some basic concepts behind bitcoin addresses are discussed. An overview on the concepts of transactions and blocks is given.
Blockchain: life of a blockchain transactionErwan Alliaume
First talk: My life as a blockchain transaction
Presentation Given our Sydney Tech Share meetup with Yann Rouillard.
You are interested in the blockchain but you are still a bit confused about how it works? Don’t wait anymore to dive into it!
In this first talk, we will shed the light on all the dark mechanisms of the blockchain by following the life of an innocent transaction from its birth to its eternal rest in the blockchain immutable history.
Cryptography, Network propagation, Proof of work, Transaction execution... nothing will be hidden from you. The only sad thing is that blockchain might not seem so magical to you after this talk. :)
https://www.meetup.com/en-AU/Tech-Share-Sydney-Meetup/events/249111190/
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
The project deals about how blockchain works, proof-of-work and merkle tree hash function. The project also tries to explain how the bitcoin uses ECDSA algorithmt power the cryptography.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
I spent quite some time to digest how Blockchain works and how it can influence our everyday life in the upcoming decades. My slides focus on that from a non-IT expert point view.
A blockchain is a distributed database on a peer-to-peer network. It is the underlying technology of the bitcoin cryptocurrency. Secure transactions between users are possible without the need for a central server or trusted authority. Blockchain technology can be used for other cases than money transfer, such as exchange of other assets, votes or credits and for provenance or identity management. Recently, discussions started whether this technology could be useful for (life) sciences. The blockchain technology will be explained and its potential and weaknesses. Examples of current business applications will be given and ideas for education, the research life cycle and biomedical and health care applications.
Blockchain data structures and fundamentalCodium Club
The blockchain is a growing list of records called blocks which are linked using cryptography. So, here's a small introductory presentation to describe the basic fundamentals and data structure of the blockchain.
This is a presentation is an introduction to the blockchain. It defines, what is the blockchain and shows how JavaScript developers can create blockchain applications.
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Gave this presentation and talk on the still evolving field of BITCOIN FORENSICS that brings out the technical overview and evolving forensics developments in the domain at the BSides Security Conference ie community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time.
The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.
A short seminar presentation on the technical background of Bitcoins. Some basic concepts behind bitcoin addresses are discussed. An overview on the concepts of transactions and blocks is given.
Blockchain: life of a blockchain transactionErwan Alliaume
First talk: My life as a blockchain transaction
Presentation Given our Sydney Tech Share meetup with Yann Rouillard.
You are interested in the blockchain but you are still a bit confused about how it works? Don’t wait anymore to dive into it!
In this first talk, we will shed the light on all the dark mechanisms of the blockchain by following the life of an innocent transaction from its birth to its eternal rest in the blockchain immutable history.
Cryptography, Network propagation, Proof of work, Transaction execution... nothing will be hidden from you. The only sad thing is that blockchain might not seem so magical to you after this talk. :)
https://www.meetup.com/en-AU/Tech-Share-Sydney-Meetup/events/249111190/
Explains what the Blockchain is and how it works. Features slides about the Cryptography, P2P Networking, Blockchain Data Structure, Bitcoin Transactions, Proof of Work Algorithm (Mining) and Scripts.
The project deals about how blockchain works, proof-of-work and merkle tree hash function. The project also tries to explain how the bitcoin uses ECDSA algorithmt power the cryptography.
Intro to Blockchain - And, by the way, what the heck is proof-of-work?Jim Flynn
An overview of bitcoin and the blockchain with a more in-depth description of proof of work (POW). Conde samples used to demonstrate the concepts behind POW are available at http://jamespflynn.com.
I spent quite some time to digest how Blockchain works and how it can influence our everyday life in the upcoming decades. My slides focus on that from a non-IT expert point view.
A blockchain is a distributed database on a peer-to-peer network. It is the underlying technology of the bitcoin cryptocurrency. Secure transactions between users are possible without the need for a central server or trusted authority. Blockchain technology can be used for other cases than money transfer, such as exchange of other assets, votes or credits and for provenance or identity management. Recently, discussions started whether this technology could be useful for (life) sciences. The blockchain technology will be explained and its potential and weaknesses. Examples of current business applications will be given and ideas for education, the research life cycle and biomedical and health care applications.
Blockchain data structures and fundamentalCodium Club
The blockchain is a growing list of records called blocks which are linked using cryptography. So, here's a small introductory presentation to describe the basic fundamentals and data structure of the blockchain.
This is a presentation is an introduction to the blockchain. It defines, what is the blockchain and shows how JavaScript developers can create blockchain applications.
A basic overview of what blockchain is with step-by-step easy to follow explanation of its core concepts. It should be easy for anyone with zero knowledge of blockchain to follow through the slides
Gave this presentation and talk on the still evolving field of BITCOIN FORENSICS that brings out the technical overview and evolving forensics developments in the domain at the BSides Security Conference ie community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time.
The increased use of cryptocurrencies such as Bitcoin among an increasing user base has opened a new avenue of research in the field of digital forensics ie Bitcoin Forensics. Since the creation of Bitcoin in 2008, cryptocurrencies have begun to make a presence in the world of e-commerce. Cryptography serves as the underlying foundation for Bitcoin, which gives it the benefits of confidentiality, integrity, non repudiation and authentication. Having been designed and built upon the foundation of these four objectives makes Bitcoin an attractive alternative to mainstream currency and provides users with the benefits of payment freedom, security, very low fees, and fewer risks for merchants.But with a pleothra of advantages that it offers,there is a definete side to worry too and thats the money laundering transactions.On an average it is estimated that around 3 lakh bitcoin transactions happen inside a day and its not an easy task any day for a forensic investigator to trace the origins here.This presentation will bring out the technical overview and evolving forensics developments in the domain.
Presentation I gave at 4th International Information Security Meet in the Hakon 2017 conference on 08th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at http://www.hakonindia.org/hakon-2017-speakers/
Blockchain and Bitcoin : A Technical Overviewanupriti
Blockchain is a distributed database that is used to maintain a continuously growing list of records, called blocks. Each block contains a timestamp and a link to a previous block and is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks.Bitcoin is a proven application that runs on BLOCKCHAIN.This ppt gives the reader an over view of the concept of BLOCKCHAIN.The same was presented by self on 20th June 2017 at Gurgaon Commissioner of Police office during Summer Internship Program under aegis of Shri Rakshit Tandon
Presentation I gave at BRIGHTTALK webinar in the BLOCKCHAIN SUMMIT on 10th Oct 2017.Covers technical overview of the concept and take off essentials for Bitcoin crime investigators.Details at https://www.brighttalk.com/webcast/1570/272431/bitcoin-forensics
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEanupriti
The world of Blockchain and Cryptocurrencies is undeniably amazing and has infinity to explore at hands.Recently I took on a 4 hour session at the prestigious Central Bureau of Investigations,CBI Academy ,Ghaziabad, vide Indian Technical and Economic Cooperation Programme organised by Ministry of External Affairs , to cover right from scratch to overview of mechanics and architecture of how this world works.Sharing here the presentation for info and awareness of anyone who is interested to take a dip in this domain and related cyber crime activities.
Blockchain Technology And CryptocurrencyEno Bassey
A brief presenation about blockchain and understand cryptocurrency. Find out what it is and why you need to know about it. How you can get involved and how it may change the world as we know it.
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Richard Givens
An overview of cryptocurrency, with a focus on Bitcoin, and an explanation of the processes involved in creating it, with a focus on novice understanding.
Report on Bitcoin- The cryptocurrency (November 2017)AJSH & Co LLP
•What is a Bitcoin?
•Understanding the basics
•How a blockchain works
•Bitcoin- Good or Bad?
•How to obtain a Bitcoin?
•Acceptability of Bitcoin around the world
•Other Cryptocurrencies
•Investing in Bitcoin
This report discuss about Bitcoin and cryptocurrencies - Understanding, Acceptability and Risks
AJSH & Co. have tremendous experience in the field of chartered accounting and have worked with chartered accounting giants in India and abroad. Please feel free to email our team at E: ankit@ajsh.in , siddhartha@ajsh.in also reachable on Direct numbers +91-98106 61322, +91-9811325395. For more information visit our website:- http://www.ajsh.in .
bitcoin
cryptocurrency
There are two main ways the block chain ledger can be corrupted to steal
bitcoins: by fraudulently adding to or modifying it. The bitcoin system protects
the blockchain against both using a combination of digital
signatures and cryptographic hashes.
hashsalim@gmail.com
Similar to Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies (20)
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
The presentation is one unique presentation peculiar to TALLINN MANUAL version 1.0 and 2.0. Along with is discussed cyber policy attempts of other countries.The Tallinn Manual has long been the flagship research initiative of the NATO CCDCOE. The original Tallinn Manual (published in 2013 by Cambridge University Press) addressed the most severe cyber operations followed by version 2.0. The presentation cover the origin details of why this manual arrived at the global scene and what followed around at the global attempts for framing the global cyber policy.
Cyber Security : An attempt to assimilate and technically understand itanupriti
his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
While anyone of us discusses cryptocurrency, we invariably hover around BITCOIN only , but as on date we have 2000+ cryptocurrencies in the world and the sad thing is CRYPTOCURRENCY CRIMES ARE RISING FAST undeterred.This presentation, given at the IETE mid term symposium on 23rd May 2020 ,brings a brief over view of how cryptocrimes work and what are the challenges around?
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Proof of Work and connect with BYZANTINE Generalsanupriti
Proof of Work (PoW) is the original blockchain consensus algorithm, and is used in projects such as Bitcoin. It is the mechanism that enables users on a blockchain network to reach an agreed ‘truth’. A proof of work is essentially an answer to a complex mathematical problem. It takes a lot of work to find the Nonce but is easy for others to validate.PoW solves the Byzantine Generals Problem as it achieves a majority agreement without any central authority, in spite of the presence of unknown/potentially untrustworthy parties and despite the network not being instantaneous.This presentation brings out the concept Byzantine Generals proof and its connect with Bitcoin.
Hashgraph is a superior consensus mechanism / data structure alternative to blockchain. A decentralized platform without servers built on Hashgraph technology will enable blockchain use cases to run:safe,secure and Fast.This pdf is a straight lift from http://www.swirlds.com
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
The Equation Group is a highly advanced secretive computer espionage group, suspected by security expert Claudio Guarnieri and unnamed former intelligence operatives of being tied to the United States National Security Agency (NSA). Because of the group's predilection for strong encryption methods in their operations, the name Equation Group was chosen by Kaspersky Lab, which discovered this operation and also documented 500 malware infections by the group's tools in at least 42 countries.This presentation gives an over view in brief based on the Kaspersky Report.
This small presentation wil sail through a set of questions for any web/Internet user and will mark for every question as the user decides to answer.The safety score as it ends up lets the user know of where he stands in terms of IT SECURITY on the web!!!!
This presentation brings out few basic steps that every android phone user should configure to harden his/her device.Although the list is not completly exhaustive but it brings out basic necessities as expected from any smart user.
Harden your LinkedIn Settings : A Necessity Nowanupriti
Most of us are part of various Social Engineering Sites and keep updating ourselves via status updates, pictures and tweeting small life updates. Related privacy and security issues in respect of these social engineering sites available is already a serious concern among users. Additionally for these all social engineering sites/applications whether accessible on a desktop or a mobile, we all are not so serious responding and interacting but that’s the difference when we see viz-a-viz LinkedIn. When it is LinkedIn…we are mostly serious…no jokes, no clips, no tagging, no personal comments, no WOWs…it’s all professional. And when most of us take it seriously, we also feed serious inputs on it. But do we take necessary precautions too?...I have mostly seen a negated curve amongst my friend circle….hardly anyone has spared time to configure LinkedIn Privacy and Security settings. In this post I bring you out basic and necessary configuration steps involved to harden your LinkedIn interface to the world.
APT 28 :Cyber Espionage and the Russian Government?anupriti
Russia may be behind a long-standing, careful campaign designed to steal sensitive data relating to governments, militaries and security firms worldwide.This presentation based on a report made public by FireEye brings an over view of their opinion.....uploaded here just for general info to understand how its all happening!!!!
An advanced piece of malware, known as ‘Regin’, has been used in systematic spying campaigns against a range of international targets including government agencies and businesses since at least 2008 vide IT security firms Symantec and Kaspersky Lab reports both released on 24th Nov 2014.This ppt brings you an overview of the threat in brief.The piece of malware is unique in the sense that it's structure displays a degree of technical competence rarely seen.Stuxnet looks a decent past....with this complexity
This ppresentation brings out a brief over view of WireLurker,the first of a kind of malware family that has made the Apple to rot...never in the history of unquestionable iOS/Mac devices has such a thing been seen or heard...with such a severe beating...the ppt is based on a report made recently public by Palo Alto Networks®...
The presentation starts with a blank slate for those who have no idea of what cloud and virtualization world is to gradually building up till handling security issues.If any one wants the soft copy,please ask for it at anupam@blumail.org
Cloud Forensics...this presentation shows you the current state of progress and challenges that stand today in the world of CLOUD FORENSICS.Based on lots of Google search and whites by Josiah Dykstra and Alan Sherman.The presentation builds right from basics and compares the conflicting requirements between traditional and Clod Forensics.
Big Data is getting bigger and bigger but at the same time before adopting it seriously and exploiting it we should also take care of the security shortcomings it comes up with....from a forensics and security point of view....we need to understand the vulnerabilities they come up with before blindly adopting them!!!!
Off course E-Governance is required.Today the worlds top 40 countries in terms of corruption free are all E-Governed!!!!!so y not for akka India.Govt has taken many steps in this direction.Though the speed is slow...is it really worth when India has one of the highest percentage of digital illiterates in the world....here comes security IQ of a common citizen into question!!!!
In my interactions in various cyber security seminars and meets,I always come across a set of users who have a "I Don't care attitude" if I try to tell them to avoid getting hacked.They say that "I don't have anything to loose..they can take my pics and passwords...their is nothing I will loose if my PC is compromised".So this presentation is for info to such guys of how deep the effect is in your life!!!!!!!
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
1. By : ANUPAM TIWARI
Research Scholar
anupamtiwari@protonmail.com
SYMPOSIUM ON LEGAL
REGULATION OF
BITCOIN, BLOCKCHAIN
& CRYPTOCURRENCIES
2. The views expressed in this
presentation are Mere Apne.
Reference to any specific products,
process ,or service do not
necessarily constitute or imply
endorsement, recommendation, or
views of Min of Def or any Govt
All images used are for illustrative
purposes only & Do not
promote any specific product
54. Distributed Ledger is a Consensus of
Replicated, Shared & Synchronized
digital data geographically spread across
multiple sites & countries
55. Type of Distributed Ledger, comprised
of Unchangeable, Digitally
Recorded Data in packages called
BLOCKS
TAMPER EVIDENT LEDGER
56.
57. Linked list data structure, with
each block containing a
hash of the previous block
58. Proof Of Work Is A Piece Of Data
Which Is Difficult To Produce But
Easy For Others To Verify And Which
Satisfies Certain Requirements
Bitcoin Uses
The Hashcash Proof
Of Work System.
PROOF OF WORK
60. Each block is formed by a proof-of-
work algorithms, through which
consensus of this distributed
system could be obtained via the
longest possible chain
67. A block is an aggregated set of data
Data is collected and
processed to fit in a
block through a process
called MINING
Each block could be
identified using a
Cryptographic Hash
68. Mining is the process
of writing blocks of
Bitcoin transactions
into the ‗The Bitcoin
Blockchain‘, and
getting rewarded with
newly created bitcoins
69. Block will contain a hash
of the previous block, so
that blocks can form a
chain from the first block
ever (known as the
Genesis Block) to the
formed block
71. Every 10 minutes, all Bitcoin
transactions taking place are bundled
into a block
These blocks linked through a
timestamp signing, form a
chain (blockchain), which goes
back to the first block ever
created (mined)
The time stamping makes it
impossible to alter any part of it
once the network confirms it
72. These rules are inbuilt in the
Bitcoin core software, which
every node in the Bitcoin
network runs
Before a new block is added to the
blockchain, the Bitcoin network
has to reach a consensus on
based on predetermined rules
73. Data in a blockchain is
internally consistent
and immutable
Each block‘s hash is
derived from the
contents of the block
Each block refers to
the previous block‘s hash,
not a sequential number
74.
75. Source : Alex Biryuk et al., Deanonymisation of Clients in Bitcoin P2P
Network
Bitcoin network is composed of
PEERS connected to others PEERS
over unencrypted TCP channels
Each peer attempts to
maintain EIGHT outgoing
connections to other peers
These eight peers are called
ENTRY NODES
76. Transaction and Block messages
are propagated in network by being
Relayed through these ENTRY NODES
to other peers
When X sends a transaction advertising
that he is transferring ownership of 1 BTC
to Y, his computer sends an inv message
to its immediate peers, the entry nodes
77. The inv message lets the entry
nodes know that there are
transactions or blocks
Entry nodes relay the data
farther throughout the network by
sending inv to their own peers
Entry nodes request full
transaction by sending
getdata response to X‘s
computer
85. A reward system, in
the form of
a website or app, that
dispenses rewards in
the form of a satoshi,
for visitors to claim in
exchange for
completing
a captcha or task as
described by the
website.
SATOSHI : 1/100th of a Millionth BITCOIN
88. 20-byte hash formatted
using base58check to produce
either a P2PKH or P2SH
Bitcoin address
00000000001F1tAaz5x1HUXrCNLbtM*****
89. How difficult it is to find
a block relative to
the difficulty of finding the easiest
possible block. The easiest
possible block has a proof-of-
work difficulty of 1.
Difficulty is changed every
2016 blocks based on the time
it took to discover 2016
previous blocks.
90.
91.
92.
93.
94.
95.
96.
97. A user for CONDUCTING
TRANSACTIONS utilizing BITCOIN,
he or she must first DOWNLOAD and
setup a BITCOIN WALLET
BITCOIN WALLET can show the
total BALANCE of all BITCOINS it
CONTROLS and let A USER PAY a
specified AMOUNT
98. WALLET contains a USER‘S
PRIVATE KEY, which ALLOWS
FOR THE SPENDING of the
BITCOINS, which are located in
the BLOCK CHAIN
Once wallet is INSTALLED &
CONFIGURED, an ADDRESS
is GENERATED which is
SIMILAR to an E-MAIL or
PHYSICAL ADDRESS
99.
100. WALLET is basically
the Bitcoin Equivalent
of a Bank account.
Allows to RECEIVE BITCOINS,
them, and then
SEND them to others
101. Connected to the Internet
or is online is said to be HOT
Cold Wallets & Hot Wallets
Cold is considered
most Secure &
suitable for Storing
Large Amounts of
bitcoins
Hot is suitable for
Frequently
Accessed funds
COLD implies it is Offline or
Disconnected from the
Internet
102. Designedto be downloaded
& used on Laptops/PCs
DESKTOPWALLETS
Armory, Multibit, Msigna
and Hive to mention a FEW
Easyto Access.
Available for Different OS
– Windows, Mac OS and Ubuntu.
105. PHYSICALWALLETS
Once they are generated, you
print them out on a piece of
paper
Paper Wallets can
Securely hold your BITCOINS
in Cold Storage form for a
long time
Bitaddress.org
or Blockchain.info
106. BitcoinQt is the First ever built
bitcoin CLIENT WALLET
BITCOINCLIENTS
WALLETS
Original bitcoin
wallet used by the
Pioneers of the
currency
COMPUTERS installed with these wallets
FORM PART OF THE CORE
NETWORK & have access to all
transactions on the blockchain
114. When we say SOMEONE HAS
BITCOINS & you look at a
PARTICULAR BITCOIN ADDRESS,
there are NO DIGITAL BITCOINS held
AGAINST that ADDRESS
BALANCE of any BITCOIN
address ISN‘T HELD at that
ADDRESS; one MUST
RECONSTRUCT it by looking at
the BLOCKCHAIN
115. Everyone on the NETWORK knows about a
TRANSACTION and THE HISTORY
OF A TRANSACTION can be TRACED
BACK to the point where the BITCOINS
were produced
126. BITCOIN-QT FOLDER STRUCTURE
Blocks – This subdirectory contains
blockchain data and contains a
―blk.dat‖ file and a ―blocks/index‖
subdirectory
―blk.dat‖ stores actual Bitcoin
blocks dumped in raw format
The ―blocks/index subdirectory‖ is a
database that contains metadata
about all known blocks
127. Chainstate subdirectory- it is a
database with a compact
representation of all currently unspent
transactions and some metadata about
where the transactions originated
BITCOIN-QT FOLDER STRUCTURE
131. 1.46 × 10^48 possible
Bitcoin Addresses
that gives every
person on Earth
2.05×10^38 Different
Addresses
132.
133.
134. Bitcoin Mixer is an Anonymous
Service, that confuses the trails
of Bitcoin transactions.
135.
136.
137.
138.
139.
140.
141.
142.
143.
144.
145.
146. PROJECT TITANIUM : Main thrust of the European
Union’s Titanium Project is to Monitor blockchains,
deanonymize wallet addresses, surveil dark net
markets, and block terrorists and money launderers.
TITANIUM, which stands for Tools for the Investigation of
Transactions in Underground Markets
147. Private key of the suspect, they can
search for that particular key on the
Blockchain to Trace the purchases
to other potential Suspects.
investigator has the Bitcoin
148. Detecting such attackers is CHALLENGING
any day
Attacking Bitcoin via the Internet
infrastructure using routing attacks
As Bitcoin connections are routed over the
Internet—in clear text and without
integrity checks—any third-party can
eavesdrop, drop, modify, inject, or
delay Bitcoin messages
149.
150. BITCOIN FORENSIC ARTIFACT EXAMINATION
Windows 7 Professional
Multibit
Bitcoin-Qt
Bitminter
Basic USB ASIC Bitcoin
Gateway laptop ML6720
120 GB WD hard drive
(4) USB ASIC Mining
drives
USB powered cooling fan
32 GB USB thumb drive
151. • System Info
• Info about Logged users
• Registry Info
• Remnants of Chats
• Web browsing Activities
• Recent Communications
• Info from Cloud Services
• Decryption Keys for encrypted
volumes mounted
COLLECTION OF BITCOIN ARTIFACTS
152. Utilizing the data from
344
transactions,
Meiklejohn able to
identify the owners of
more than a million
Bitcoin addresses
Sarah Meiklejohn, a Bitcoin focused
Computer Researcher
Extensive Research
in
Bitcoin Blockchain
Found that by looking
blockchain an
investigator can
uncover who owns a
Bitcoin addresses
153. 2015
“In this paper we show that combining TOR and
BITCOIN creates an ATTACK VECTOR for the
stealthy man-in-the-middle attacks. A LOW-
RESOURCE ATTACKER gain FULL
CONTROL of information flows between all users
who chose to use Bitcoin over TOR. In particular the
attacker CAN LINK TOGETHER USER’S
TRANSACTIONS regardless of pseudonyms used”
154. Bitcoin transactions occur via a
Network Connection, an investigator
should seize any Physical Object that
can connect to the Internet in addition
to the hard drive
COLLECTION OF BITCOIN ARTIFACTS