crypto

Monero stands on its Peer To Peer (P2P) communication network. The network’s blockchain-aware computers—called nodes—share the information that powers Monero, such as node addresses, historical blockchain data, blocks as they are mined, and new transactions to be added to blocks. The nodes are identified using Internet Protocol (IP) addresses, though,Read More →

Reverse-engineering

Google Cast is a proprietary protocol by Google which enables controlling playback of Internet-streamed audiovisual content on the Chromecast, Android TV and other compatible devices. From the consumer perspective, Google Cast connects two devices: a sender (i.e a smartphone) and a receiver (such as a Chromecast). Using the Google CastRead More →

monero

There’s a good chance everyone who reads this story will have had some degree of interaction with a botnet we call MyKings (others call DarkCloud or Smominru), whether you know it or not. For the past couple of years, this botnet has been a persistent source of nuisance-grade opportunistic attacksRead More →

ltc

How much computing power as well as money is required to carry out a 51% attack on a blockchain like that of Litecoin which uses PoW as its protocol? Blockchains using the PoW consent protocol (Proof of Work) use the computing power of machines to secure data and the network that hasRead More →