Jump to content

User:Angel volk/sandbox

From Wikipedia, the free encyclopedia
blockchain

Encryption

How does encryption work?

    • Scramble the data to “encrypt” it
    • Use key to unscramble data (decrypt)
    • Plaintext is what you would call the message within the encryption.
    • Cipher text is what you would call the encrypted message (unreadable).
    • Encrypted messages can be hacked throughout time with the right technology


How does encryption protect privacy?

    • Turns you data into “your eyes only” messages
    • For example, emails you send, the plaintext can only be read by you and the recipient.
    • The purpose of encryption is to provide data confidentiality
    • Encryption and privacy work together


How does cryptocurrency use encryption?

    • Relying on modern asymmetrical encryption methods
    • Blockchain's/hashing techniques
    • Private keys for cryptocurrency owners to verify they are the owners


Question

    • STILL NEED TO ADD INFO ABOUT BLOCKCHAIN/HASHING AND ABOUT DARK WEB, ALSO ABOUT KEYS.

Citations

  • Kethineni, S., & Cao, Y. (2020). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325-344.
  • Nerurkar, P., Bhirud, S., Patel, D., Ludinard, R., Busnel, Y., & Kumari, S. (2021). Supervised learning model for identifying illegal activities in Bitcoin. Applied Intelligence, 51(6), 3824-3843.
  • Liggett, R., Lee, J. R., Roddy, A. L., & Wallin, M. A. (2020). The dark web as a platform for crime: An exploration of illicit drug, firearm, CSAM, and cybercrime markets. The Palgrave handbook of international cybercrime and cyberdeviance, 91-116.