Question

In: Computer Science

Find an article related to technology your topic/question of choice that has a belief that you...

Find an article related to technology your topic/question of choice that has a belief that you strongly disagree with. For example, if you feel that bitcoin and cryptocurrencies SHOULD NOT be regulated, you should find an article that takes the stance that there SHOULD be regulations.

Write a summary of the article. Instead of discussing the side of the argument you actually believe, you are going to write a summary of the belief that you strongly disagree with. With the example discussed above, you would right a neutral and impartial summary of why the author of the article feels there should be regulations on cryptocurrencies, what they are, and why.

Part 2C: You will now write about the position you actually hold on the topic. Use the article as a point of reference. With the example discussed above, this would be the space you write about how you feel cryptocurrencies should not be regulated and why. Even though this is how you really feel, try to be neutral, impartial and unbiased in your presentation of the information.

The goal of this assignment is to try and write two neutral summaries based on opposite points of view of the same issue. This is not easy! But, as you will find, this will strengthen your overall writing. If someone is NOT able to tell which position you actually hold after reading both of these articles - you have succeeded! Your summaries should be 250 words each (total assignment word count of 500 words), double-spaced and include APA in-text citations

Solutions

Expert Solution

In my opinion, however, prevention and mitigation technologies will never work well enough. There’s only one way to slay this beast. We must make all cryptocurrency as we know it today illegal. Here’s why.

Permissionless vs. Permissioned Blockchain- At the heart of Bitcoin, and by extension most if not all altcoins (cryptocurrencies other than Bitcoin), is the notion of a permissionless blockchain. With a permissionless (generally known as ‘public’ or ‘open,’ with few exceptions) blockchain, anyone can create an address and interact with the network – purchasing coin, selling coin, or mining coin.The public approach draws a stark contrast with permissioned blockchain (generally ‘private’ or ‘closed,’ again with a few exceptions). “The permissioned Blockchain is a closed and monitored ecosystem where the access of each participant is well defined and differentiated based on role,” explains Devon Allaby, COO of Design Farm Collective. “They are built for purpose, establishing rules for transaction that align with the needs of an organisation or a consortium of organisations.”

The Problem with Permissionlessness- The problem with permissionless, public blockchains is that anybody can sign up as a miner – which means that there’s nothing stopping criminals from doing so. Not all mining enterprises are criminal, of course. There are plenty of people building mining businesses that are perfectly on the level. But that being said, there are many different criminal pursuits that can leverage mining. Tax evasion. Money laundering. Funding terrorism or other illegal activity not directly related to cryptocurrency. But the most nefarious of all criminal motivations: illicit cryptomining.

Why Illicit Cryptomining is So Devious- Infiltrating our computers and networks is dead simple – all it takes is one phishing victim, one visit to a malicious web page, or one person downloading a fake app from an app store, and bam! The hacker is inside.Infiltration is a familiar first step to most corporate cyberattacks, which follow the Cyber Kill Chain – infiltrate, install malware, move laterally to a valuable target, establish a command and control (C&C) link back to the hacker, and then exfiltrate the data or funds that are the target of the attack.Hackers follow this pattern when their goal is to steal something (in other words, ‘exfiltrate data’). As a result, cybersecurity vendors have been focusing on detecting and disrupting the steps in the Kill Chain.Cryptomining, in contrast, breaks this mold. The software technically isn’t malware – after all, plenty of people mine cryptocurrency on purpose. There’s no need to find a valuable target, since any computer with processor cycles to spare will do.And there’s nothing to exfiltrate. As long as the compromised computer can reach the Internet, the threat actors can cash in on their mining activity.The most devious aspect of illicit cryptomining, however, is the fact that it can run undetected indefinitely. After all, nothing’s being stolen except excess processor cycles and a bit of electricity. In this world of far scarier threats, illicit cryptomining will always rank rather low on the list of priorities.Until, of course, it brings your entire network to its knees.

Cryptocurrency Ethics and ‘Know Your Miner’- To combat money laundering, regulatory agencies around the globe require companies to ‘know your customer’ (KYC). In theory, if all participants in a transaction have sufficient details about the parties they’re doing business with, then it will be far more difficult for criminals to launder their ill-gotten gains.Because anyone can become a cryptocurrency miner, it would only be logical for the same regulatory bodies to institute a ‘know your miner’ policy.

How to Fix the Problem- Corporations will certainly try to prevent illicit cryptomining, but such efforts are doomed to be a losing battle – first, because it’s dead simple to mount such attacks, and second, fighting such threats will remain a low priority for the foreseeable future.That leaves ‘know your miner’ – which can only work on permissioned blockchains.

Perhaps a cryptocurrency-based approach like Ripple that some people consider ‘semi-permissioned’ can solve this problem. (Ripple’s XRP altcoin and other permissioned or semi-permissioned cryptocurrencies are an area of active innovation and controversy ).However, as long as permissionless-based coins have value, illicit miners will favor those over Ripple and its brethren anyway.The cryptocurrency world, therefore, will have two choices: switch entirely from permissionless to permissioned (or perhaps semi-permissioned) or shut down entirely.

Of course, many of the aspects of blockchain that excite the cryptocurrency world depend upon permissionlessness. Without it, all we have is a secure distributed database technology – which might very well come in handy for real business purposes, but falls short of supporting the excitement around cryptocurrencies today – including the buzz around initial coin offerings (ICOs).

Corporations will certainly try to prevent illicit cryptomining, but such efforts are doomed to be a losing battle – first, because it’s dead simple to mount such attacks, and second, fighting such threats will remain a low priority for the foreseeable future.That leaves ‘know your miner’ – which can only work on permissioned blockchains.The cryptocurrency world, therefore, will have two choices: switch entirely from permissionless to permissioned (or perhaps semi-permissioned) or shut down entirely.Of course, many of the aspects of blockchain that excite the cryptocurrency world depend upon permissionlessness. Without it, all we have is a secure distributed database technology – which might very well come in handy for real business purposes, but falls short of supporting the excitement around cryptocurrencies today – including the buzz around initial coin offerings (ICOs).


Related Solutions

Choose a scholarly article related to your research paper topic and a non-scholarly article directly related...
Choose a scholarly article related to your research paper topic and a non-scholarly article directly related to your topic and explain how they are similar and different. Please use specific examples from each article. Make sure to include references to your articles.
Find 1 research article related to search engine technology and summarize the article. (It could also...
Find 1 research article related to search engine technology and summarize the article. (It could also be an article related to agents and search engines or text retrieval if you prefer). The research article should be from a research conference or journal.
Find an article related to business Ethics and summarize it. The article has to be a...
Find an article related to business Ethics and summarize it. The article has to be a journal article not an internet piece. Choose an article in an academic journal and answer the following questions: What is the aim of the article What is the method the author uses to reach the aim What are the major findings and result in the article Why do you think their findings are important.
5. Using MEDLINE, find an article on the disease registry of your choice. Summarize the article.
5. Using MEDLINE, find an article on the disease registry of your choice. Summarize the article.
I need an article on any economic topic. You are required to find an article that...
I need an article on any economic topic. You are required to find an article that is relevant to economics and make an argument in your analysis using appropriate economic terminology. Make sure you are referencing all appropriate sources. Length 1 to 2 pages
Find 1 research article related to search engine technology and summarize. (It could also be an...
Find 1 research article related to search engine technology and summarize. (It could also be an article related to agents and search engines or text retrieval if you prefer). The research article should be from a research conference or journal.
Find a news article of your choice describing a good or service (you may use articles...
Find a news article of your choice describing a good or service (you may use articles from websites such as cnn.com or foxnews.com). Summarize the situation and identify what supply or demand shift factor is at work. Describe the effect on equilibrium price and quantity given the shift factor.
Please reserch online, find a article related the topic "How to deal stress in workplace" 1....
Please reserch online, find a article related the topic "How to deal stress in workplace" 1. You should be thorough in summarizing the main intent of the article, paraphrasing in your own words the key ideas of each article that relate to the topic 2. You must also include a discussion about the article related the topic "How to deal stress in workplace" 3. Analysis the source. Look to justify your sources as credible and relevant while connecting the information...
For this question, please find an article from a mainstream news source that covers the topic...
For this question, please find an article from a mainstream news source that covers the topic of Monetary policy which highlights the importance of the Monetary Policy as it impacts the determination of exchange rates and represent it using graphs. Please also include whether you believe the Coronavirus pandemic has impacted this effect. (Please use graphs to support your answer).
Find a current event article or video of your choice relating to Project Analysis & Risk...
Find a current event article or video of your choice relating to Project Analysis & Risk and Return. Use local, national or international media outlets. Students should utilize professional business media sources
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT