Decentralised networks such as Bitcoin and Ethereum have the potential to revolutionize many different industries thanks to their secure, transparent and immutable properties allowing for a decentralised way to store data and transfer value. The current limitations of these networks are the scalability and performance challenges they face. The Bitcoin network can handle 7 transactions […]
Getting started: Blockchain, Wallets, DeFi and Uniswap
If you’re new to the world of blockchain and decentralised finance (DeFi) you may be wondering how to get started. In this short article I will explain what web3 and decentralised finance (DeFi) are, how to create a wallet, and some popular providers you can use to access DeFi services. What is blockchain? Blockchains are […]
Zero Knowledge Proofs in Decentralised Networks
Zero-knowledge proofs are an effective tool for improving the security and privacy of decentralised networks. A zero-knowledge proof is a mathematical technique that allows for one party (the prover) to prove to another party (the verifier) that they know the value of a specific piece of information without revealing the actual information. The most well-known […]
Limitations of Anti-Virus Software: Stuxnet, Duqu, Flame and Red October
This post will be a short technical comparison of the biggest advanced persistent threats over the last 10 years; Stuxnet, Duqu, Flame and Red October. Stuxnet Stuxnet was spotted as early as June 2009 and this was one of the first major APT’s due to the impressive change in the complexity in comparison to traditional […]
An Introduction to Multi-level Security Confidentiality: Clark-Wilson and Brewer Nash Models vs Bell-Lapadula and Biba Models
The Biba Model was developed by Kenneth J. Biba and released in 1977 as a security model which focuses on the integrity of data. This was intended for non-military organisations where the integrity of data was more important than the confidentiality of data. This model is built on the state machine concept which focuses on […]
5 Secure Coding Practices for Software Engineers
Developers work towards solving specific issues and since programming is a skill used in many industries, this means there are a lot of developers who are designing and creating solutions/applications. A challenge faced by developers when writing secure software is the vast amount of tutorials available on the internet. These tutorials successfully demonstrate how to […]