30,806 research outputs found

    Anonymous network access using the digital marketplace

    Get PDF
    With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access

    Cryptocurrencies Are Taxable and Not Free From Fraud

    Get PDF
    In this report, the authors discuss cryptocurrencies — especially bitcoin — and argue that because the IRS lists them as property, they are taxable, and because they are not as anonymous as once thought, they are not free from fraud. Cryptocurrencies are digital assets used as a medium of exchange, but they are not really coins. They can be sent electronically from one entity to another almost anywhere in the world with an internet connection. There are many cryptocurrencies in the market, including bitcoin, ethereum, ethereum classic, litecoin, nem, dash, iota, bitshares, monero, neo, and ripple. Many of the cryptocurrency networks are not controlled by a single entity or company; instead, a decentralized network of computers keeps track of the currency using a token ID. A ledger maintains a continuously growing list of date stamped transactions in real time called “blocks.” This technology is known as blockchain, which records, verifies, and stores transactions without a trusted central authority. The network instead relies on decentralized autonomous organizations (DAOs) with uncertain legal standing

    The Internet of Things Connectivity Binge: What are the Implications?

    Get PDF
    Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services and opportunities

    Quire: Lightweight Provenance for Smart Phone Operating Systems

    Full text link
    Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused Deputy attack). In Quire, we engineered two new security mechanisms into Android to address these issues. First, we track the call chain of IPCs, allowing an app the choice of operating with the diminished privileges of its callers or to act explicitly on its own behalf. Second, a lightweight signature scheme allows any app to create a signed statement that can be verified anywhere inside the phone. Both of these mechanisms are reflected in network RPCs, allowing remote systems visibility into the state of the phone when an RPC is made. We demonstrate the usefulness of Quire with two example applications. We built an advertising service, running distinctly from the app which wants to display ads, which can validate clicks passed to it from its host. We also built a payment service, allowing an app to issue a request which the payment service validates with the user. An app cannot not forge a payment request by directly connecting to the remote server, nor can the local payment service tamper with the request

    Emerging Technologies, Law Enforcement Responses, and National Security

    Get PDF

    Bitcoin: Where Two Worlds Collide

    Get PDF

    Prosecuting Dark Net Drug Marketplace Operators Under the Federal Crack House Statute

    Get PDF
    Over 70,000 Americans died as the result of a drug overdose in 2017, a record year following a record year. Amidst this crisis, the popularity of drug marketplaces on what has been called the “dark net” has exploded. Illicit substances are sold freely on such marketplaces, and the anonymity these marketplaces provide has proved troublesome for law enforcement. Law enforcement has responded by taking down several of these marketplaces and prosecuting their creators, such as Ross Ulbricht of the former Silk Road. Prosecutors have typically leveled conspiracy charges against the operators of these marketplaces—in Ulbricht’s case, alleging a single drug conspiracy comprising Ulbricht and the thousands of vendors on the Silk Road. This Note argues that the conspiracy to distribute narcotics charge is a poor conceptual fit for the behavior of operators of typical dark net drug marketplaces, and that the federal “crack house” statute provides a better charge. Though charging these operators under the crack house statute would be a novel approach, justice is best served when the crime accurately describes the behavior, as the crack house statute does in proscribing what dark net drug marketplace operators like Ulbricht do
    corecore