13 research outputs found

    Virtual Currencies Bitcoin & What Now After Liberty Reserve, Silk Road, and Mt. Gox?

    Get PDF
    During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies, cybercrimes and payment systems, darknets, Tor and the “deep web,” Bitcoin; Liberty Reserve, Silk Road, and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly

    The Economics of Bitcoin and Similar Private Digital Currencies

    Get PDF
    Recent innovations have made it feasible to transfer private digital currency without the intervention of an institution. A digital currency must prevent users from spending their balances more than once, which is easier said than done with purely digital currencies. Current digital currencies such as Bitcoin use peer-to-peer networks and open-source software to stop double spending and create finality of transactions. This paper explains how the use of these technologies and limitation of the quantity produced can create an equilibrium in which a digital currency has a positive value. This paper also summarizes the rise of 24/7 trading on computerized markets in Bitcoin in which there are no brokers or other agents, a remarkable innovation in financial markets. I conclude that exchanges of foreign currency may be the obvious way in which use of digital currencies can become widespread and that Bitcoin is likely to limit governments’ revenue from inflation

    Bitcoin and the Japanese Retail Investor

    Get PDF
    The objective of this research is to examine the Bitcoin rally of 2017 as it occurred in Japan and establish a greater context for why it was the Japanese retail investors that propelled the nation to being the largest trader of the cryptocurrency at the end of the year. This dissertation begins with the examination of the technical and economical properties of Bitcoin by classifying it as fulfilling two roles: that of a means of payment and that of an investment commodity. Following that is a description of Bitcoin’s roots and the history of its non-speculative usage. These chapters serve as a base for examining the cryptocurrency’s role in Japan. The third chapter examines the Japanese retail investor and the Japanese retail investment landscape with a focus on the question of the low rates of risk-asset participation in face of a favorable investment environment. Historical context is drawn upon to argue that the present situation, wherein most financial assets are kept as cash, is rather the result of the historical path dependence than the present-day conditions in which Japanese retail investors operate. The final chapter addresses the question of high-risk activities in the form of gambling and margin trading by a group of predominantly middle-aged men and connects this propensity to engage in zero-sum games with Bitcoin’s success in Japan. The author argues that the solitary practice of high-risk financial activities enabled by trusted institutions is separate from the general savings tradition that suffered shocks following the low interest-rate regime and that it was the high-risk gambles that became the primary cause for the popularity of Bitcoin. The dissertation concludes with the argument that the success of Bitcoin in 2017 had been in no small part achieved precisely by inverting the hard-line libertarian values of its creators and making it a centrally-held commodity offered by a banking-like institution with a strong public presence

    Hardening Tor Hidden Services

    Get PDF
    Tor is an overlay anonymization network that provides anonymity for clients surfing the web but also allows hosting anonymous services called hidden services. These enable whistleblowers and political activists to express their opinion and resist censorship. Administrating a hidden service is not trivial and requires extensive knowledge because Tor uses a comprehensive protocol and relies on volunteers. Meanwhile, attackers can spend significant resources to decloak them. This thesis aims to improve the security of hidden services by providing practical guidelines and a theoretical architecture. First, vulnerabilities specific to hidden services are analyzed by conducting an academic literature review. To model realistic real-world attackers, court documents are analyzed to determine their procedures. Both literature reviews classify the identified vulnerabilities into general categories. Afterward, a risk assessment process is introduced, and existing risks for hidden services and their operators are determined. The main contributions of this thesis are practical guidelines for hidden service operators and a theoretical architecture. The former provides operators with a good overview of practices to mitigate attacks. The latter is a comprehensive infrastructure that significantly increases the security of hidden services and alleviates problems in the Tor protocol. Afterward, limitations and the transfer into practice are analyzed. Finally, future research possibilities are determined

    Postcolonial Piracy

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Across the global South, new media technologies have brought about new forms of cultural production, distribution and reception. The spread of cassette recorders in the 1970s; the introduction of analogue and digital video formats in the 80s and 90s; the pervasive availability of recycled computer hardware; the global dissemination of the internet and mobile phones in the new millennium: all these have revolutionised the access of previously marginalised populations to the cultural flows of global modernity. Yet this access also engenders a pirate occupation of the modern: it ducks and deranges the globalised designs of property, capitalism and personhood set by the North. Positioning itself against Eurocentric critiques by corporate lobbies, libertarian readings or classical Marxist interventions, this volume offers a profound postcolonial revaluation of the social, epistemic and aesthetic workings of piracy. It projects how postcolonial piracy persistently negotiates different trajectories of property and self at the crossroads of the global and the local

    The Critique of Digital Capitalism: An Analysis of the Political Economy of Digital Culture and Technology

    Get PDF
    Anything that can be automated, will be. The “magic” that digital technology has brought us — self-driving cars, Bitcoin, high frequency trading, internet of things, social networking, mass surveillance, the 2009 housing bubble — has not been considered ideologically. The Critique of Digital Capitalism identifies how digital technology has captured contemporary society in a reification of capitalist priorities. The theory proposed in this book is the description of how digital capitalism as an ideologically “invisible” framework is realized in technology. Written as a series of articles between 2003 and 2015, it provides a broad critical scope for understanding the inherent demands of capitalist protocols for expansion without constraint (regardless of social, legal or ethical limits) that are increasingly being realized as autonomous systems no longer dependent on human labor or oversight and implemented without social discussion of their impacts. The digital illusion of infinite resources, infinite production, and no costs appears as an “end to scarcity,” whereby digital production supposedly eliminates costs and makes everything equally available to everyone. This fantasy of production without consumption hides the physical costs and real-world impacts of these technologies

    Postcolonial Piracy

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Across the global South, new media technologies have brought about new forms of cultural production, distribution and reception. The spread of cassette recorders in the 1970s; the introduction of analogue and digital video formats in the 80s and 90s; the pervasive availability of recycled computer hardware; the global dissemination of the internet and mobile phones in the new millennium: all these have revolutionised the access of previously marginalised populations to the cultural flows of global modernity. Yet this access also engenders a pirate occupation of the modern: it ducks and deranges the globalised designs of property, capitalism and personhood set by the North. Positioning itself against Eurocentric critiques by corporate lobbies, libertarian readings or classical Marxist interventions, this volume offers a profound postcolonial revaluation of the social, epistemic and aesthetic workings of piracy. It projects how postcolonial piracy persistently negotiates different trajectories of property and self at the crossroads of the global and the local

    Taking Sides

    Get PDF
    Is there an option to oppose without automatically participating in the opposed? This volume explores different perspectives on dissent, understanding practices, cultures, and theories of resistance, dispute, and opposition as inherently participative. It discusses aspects of the body as a political instance, the identity and subjectivity building of individuals and groups, (micro-)practices of dissent, and theories of critique from different disciplinary perspectives. This collection thus touches upon contemporary issues, recent protests and movements, artistic subversion and dissent, online activism as well as historic developments and elemental theories of dissent

    Abuses of Dominant ICT Companies in the Area of Data Protection

    Get PDF
    corecore