Loading

Cryptocurrency As A Cybersecurity Alarm

Posted by: Poster Image

Summary Argument: During some computer attacks, IT departments are not aware that a successful penetration has occurred. This article argues that a cryptocurrency honeypot can be used as a security alarm to alert the company of the attacker's penetration.  949 tokens
Agree Disagree
Loading

Celody generates a private key for you to access withdrawn tokens. If you lose this key, you will lose access to your tokens. So keep it safe! Celody does not store these keys.

tokens Generate New Key Use Existing Key
tokens Start Deposit
tokens Start Transfer
Export to AVAX C-Chain Import from AVAX C-Chain

Submit Address

Celody will transfer tokens to address:

tokens Submit Token Amount
Submit Address

Celody will receive your tokens from address:

tokens Submit Token Amount

You have 10 minutes to make ONLY 1 transaction.

10:00

Send CLDY tokens from address (0x000...) to address: 0x0000000000000000000000000000000000000000

After sending, click the "SENT" button below:

Tokens Sent
Admin Review

Enter transaction hash for confirmation:

Back to Menu
Loading Posts...
     IT systems are under constant attack. Hardly a day goes by without news of a major data breach. These disclosed data breaches are all now known to the IT departments, which is why they are publicly announced. But many times, the attack process starts with an unknown intruder trying to penetrate the system. And many times, at this point, the IT departments are not yet aware of the attacker's presence.
     Security professionals are most interested in the point where the attack becomes successful. The key issue is how the engineer recognizes the breach. Oftentimes, the attackers are so skilled that it is months or more before the breach is detected. Sophisticated attackers can remain undetected, carefully exfiltrating data. Security networks need monitoring alarms based on guardrails or anomalies to be able to detect these actors.
     With the advent of cryptocurrency, many penetration testing challenges use crypto as a reward in a capture-the-flag style contest. The private key of the crypto wallet is used as a reward for the pentester who is able to successively penetrate into the network. While this cryptocurrency feature is used as a reward for the pentester, what if the cryptocurrency was instead used as a security mechanism for the IT company?
     One interesting security mechanism is to leave a cryptowallet with a live private key (containing real money) blended into the network (perhaps in a billing or accounting folder). And then monitor that address as a signal of breach. Any attacker will have to give up real digital value to not withdraw the money. Being a profit maximizer, with a large enough crypto bounty, the attacker will likely try to trigger the alarm. All the IT department needs to do is monitor the balance of the wallet address.

Staked:

Slash Date:

Slash Result:

Staked:

Slash Date:

Slash Result:

Staked: 1490 tokens Verify

Imagining An Age Of Indulgence

The world is slowly rising, with the level of extreme poverty steadily declining. This article argues that the ultimate goal of extreme luxury will bring psychological challenges that match some of the problems of poverty.

Posted by: Poster Image

Read
Staked: 1483 tokens Verify

Coronavirus And Healthcare After Effects

The mortality rate of the coronavirus has tragically been focused on the sickest members of society. This article argues that a perverse consequence of the virus's targeting may be a relatively more prosperous healthcare industry in the future.

Posted by: Poster Image

Read
Staked: 1477 tokens Verify

The Future War of World Currencies

The U.S. dollar has been the world's reserve currency for decades. This article argues that continued printing of U.S. dollars according to Modern Monetary Theory is likely to bring a world war of currencies, with the world's reserve likely ending up being bitcoin or ethereum.

Posted by: Poster Image

Read
Staked: 1476 tokens Verify

The Clone Wars

A new business risk has recently been uncovered: the risk of deplatforming. This article argues that to mitigate this risk a business will have to fully clone the entire business stack - from infrastructure to lawyers to email providers and more.

Posted by: Poster Image

Read
Staked: 1456 tokens Verify

Applying The Teaching Of American Universities...

Most American universities are liberally progressive. This article argues that the structure of American universities themselves are completely unequal, with elite colleges having disproportionately bigger endowments and resources. Universities that believe in equality of outcome should rebalance universities themselves.

Posted by: Poster Image

Read
Staked: 1432 tokens Verify

The Hidden Benefits Of Iframe Based Development

Iframe based web development as a software practice hasn't sufficiently been analyzed. This article argues that iframes allow single page apps to isolate security, improve performance, and increase developer speed through modular operations.

Posted by: Poster Image

Read
Staked: 1335 tokens Verify

Progressive Tax Analogs

There is a large segment of society that champions progressive tax systems to reduce inequality. This article argues that there is not a similarly sized segment that champions other progressive systems to reduce inequality in other areas of society. Why not?

Posted by: Poster Image

Read
Staked: 1151 tokens Verify

Thinking From Second Principles

There's a current fashion to approach problems from first principles in order to come up with fresh solutions. This article argues that thinking from second principles provides a quicker solution path while still yielding novelty.

Posted by: Poster Image

Read
Staked: 4.425 tokens Verify

30 Minute HIIT Cardio

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.3 tokens Verify

Elon Musk Interview

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.01 tokens Verify

Glenn Greenwald on Censorship

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.972 tokens Verify

2020 Reflections on Crypto

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.44 tokens Verify

WWSD Podcast

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.4 tokens Verify

Joe Rogan Experience With Tulsi Gabbard

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.38 tokens Verify

Operation Fireball 2.0

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 3.152 tokens Verify

V Is For Vaccine

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.588 tokens Verify

Wow, No Thank You

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.467 tokens Verify

Why Fish Don't Exist

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.33 tokens Verify

Javascript the Good Parts

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.318 tokens Verify

Bitcoin Billionaires

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.99 tokens Verify

Calling My Phone

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.87 tokens Verify

Limit

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.64 tokens Verify

Arcade

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Staked: 4.467 tokens Verify

Crave You

Post Loading...

Posted by: Poster Image

Posted by: Poster Image

Voting In Process