Ties.DB has launched the first public, decentralized and distributed database that has been created by members of the crypto community for widespread use. This cutting edge B2B product offers an outstanding solution for the soaring demands of data storage. The distinct feature of Ties.DB is the its flexibility and adaptability of its database for any blockchain project, or app, either on Ethereum, Ark, Waves, Rchain or any other. TiesDB founders and the project team have decided to focus the company's efforts on accelerating the launch of their database due to the enormous growth and emergence of various decentralized messengers, social networks, media, and large encyclopedias. TiesDB has created a public, decentralized and distributed database that will solve the problem of storing non-financial content and quick data retrieval for dapps. Decentralized applications, in which there is at least one centralized component, for example, a classical database, cannot be decentralized per se, … [Read more...] about How does Ties.DB database use blockchain technology?
How does encryption work
THE controversial digital currency Bitcoin has soared to an all-time high after its price rocketed more than 15 per cent over the weekend.As it stands on November 27, a single Bitcoin is valued at a staggering £7,476.18- an 800 per cent rise since the start of the year.Here's the lowdown.Bitcoin is a virtual currency that was created in 2009 by an unknown computer whizz using the alias Satoshi Nakamoto.Individual Bitcoins are created by computer code.The total value of all Bitcoin in existence is now more than £112billion.Transactions are made without middle men, so there are no transaction fees and no need to give your real name.More businesses are beginning to accept them and in some parts of the world you can even buy pizza with Bitcoins.You can set up a virtual wallet websites like Blockchain to store, keep track and spend your digital money.You are also able to purchase Bitcoin through an online exchange or Bitcoin ATM.To find merchants that accepts … [Read more...] about What is Bitcoin, what is its price in USD and GBP, what is mining and how does it work?
FACEBOOK is the app that does everything.And while it already features everything from locations to safety alerts, users of the Messenger add-on on their phone will soon also be able to send money via the app. Here's what you need to know.To use the feature, Facebook Messenger users need to enter their debit card details into the app, this then enables them to instantly transfer money via a message.Facebook say that all card details are encrypted and protected with "bank level" security.When it comes to sending a payment, all users need to do is tap the "new payments" icon and enter the amount that they wish to transfer to their pal.To receive money you'll need to set up a debit card on your account.You can only make a payment using the Messenger App, on Apple or Android handsets - and there's a limit of £250 per transaction.The new feature even comes with an assistant, designed to make sending money even simpler.Virtual assistant "M" is on hand to recognise when you and a friend … [Read more...] about How does Facebook Messenger payments work, has it launched in the UK and is it a secure way to transfer money?
A FRESH cyber attack has seen computers go down in Russia, Ukraine, Germany and Turkey which has been blamed on ransomware.Dubbed "Bad Rabbit," the virus is the latest example of cyber criminals using ransomware to extort cash - here’s everything you need to know.Bad Rabbit is a strain of ransomware.It is believed to be behind the trouble and has spread to Russia, Ukraine, Turkey and Germany.A message will pop up on users' screens telling them their computer had been locked and they must pay £280 in Bitcoin to regain access.Russia has been hit hardest but computers in Turkey and Germany are also reported to be affected.Bad Rabbit infects a network when one person inadvertently runs a fake Adobe Flash Player installer that has been manipulated to look like the real deal.After infecting one machine in a network - one computer in an office, for example - Bad Rabbit can find any login details stored on the machine which it uses to spread to others, security researchers have … [Read more...] about What is the Bad Rabbit ransomware attack, how does the malware work and how can you protect against the virus?
IT is the shadowy underbelly of the internet, used to hide illegal activity online.Only accessible via special software, the dark web has become a major problem for global law enforcement agencies. But what is it, where did it come from and how does it work?The internet is actually made up of three different layers: the surface web, the deep web and the dark web.The top layer, the surface web, are web pages that show up using search engines such as Google – like The Sun website that you’re looking at right now.The deep web are web pages which search engines can’t access and are therefore hidden, accessed via passwords and authorisation.Any time you log into an account you’re accessing deep web content that won’t show up on a search engine. For example, work intranets, password-protected areas of online banking and draft blog posts are all stored on the deep web.This means that if someone was to Google your name, your banking information or Amazon … [Read more...] about What is the dark web? From drugs and guns to the Chloe Ayling kidnapping, a look inside the encrypted network
Apple's highly-anticipated iPhone X goes on sale this Friday, and along with its stunning 5.8-inch edge-to-edge display, one of the new device's signature features is a new security system called Face ID. Like the Touch ID fingerprint reader on previous versions of the iPhone, Face ID is used to verify the identity of the user. It uses the iPhone X 's "TrueDepth" selfie camera to scan your face, and compare it with a 3D image stored on the phone. If a match is detected, the phone automatically unlocks. Apple's head of software engineering, Craig Federighi, attempted to demonstrate the feature at the iPhone X launch event in September, but was left red-faced when it failed to unlock the phone . The company later claimed that this was due to the large number of people who had handled the device ahead of the presentation. "People were handling the device for stage demo ahead of time and didn't realise Face ID was trying to authenticate their face," an Apple spokesperson told Yahoo in … [Read more...] about How does Apple’s Face ID work? Here’s what you need to know about the iPhone X’s signature feature
THE controversial digital currency Bitcoin has soared to an all-time high after its price rocketed more than 15 per cent over the weekend.As it stands on November 27, a single Bitcoin is valued at a staggering £7,300 - an 800 per cent rise since the start of the year.Here's the lowdown.Bitcoin is a virtual currency that was created in 2009 by an unknown computer whizz using the alias Satoshi Nakamoto.Individual Bitcoins are created by computer code.The total value of all Bitcoin in existence is now more than £112billion.Transactions are made without middle men, so there are no transaction fees and no need to give your real name.More businesses are beginning to accept them and in some parts of the world you can even buy pizza with Bitcoins.You can set up a virtual wallet websites like Blockchain to store, keep track and spend your digital money.You are also able to purchase Bitcoin through an online exchange or Bitcoin ATM.To find merchants that accepts … [Read more...] about What is Bitcoin, how does it work and what is the current value in pounds sterling?
FACEBOOK'S anti-terror chief has said that encryption "isn't going to end" despite pleas from the government.Apps like Telegram and WhatsApp use encryption to ensure that messages cannot be intercepted - something MPs have claimed offers terrorists and criminals a "safe space" to communicate in total privacy.But Brian Fishman, who leads a 150-strong team tasked with finding, monitoring and removing extremists and extremist material on Facebook, said that the UK government's request to provide a backdoor into terrorists' conversations would always fall on deaf ears.When quizzed on his stance on encryption while speaking this morning at Wired Live in London, he told the audience that there was no wiggle room.Fishman said: "We think the right way to manage this is...that the governments have an interested, frankly, in working with companies that want to be responsible in what we can provide - if we can provide - some bits of information rather than pushing this [encryption] out to a … [Read more...] about Facebook anti-terror chief says government attempts to ban WhatsApp encryption will FAIL
Full disclosure: I've been using Apple devices since the mid-1990s. My first was a grey plastic laptop with a 3.5 inch floppy drive. I am so locked-in, I think I must have thrown away the key myself. But I have an open mind. Which is good, because I've grown increasingly weary of the Cupertino mob's focus on consumer whizz-bangery. And its music app … aaah! Stop syncing what ain't there. So I've been wondering: what would be my alternatives? The iPhone 7 is pretty ordinary as new technology goes, and perhaps the slow sales prove it. A Samsung, running Android? No, thanks. Not after the Galaxy Note 7 burnout, and Android is a "fragmented" operating system (everyone's running a different version) - and it's just too Google for me. What about a Huawei, HTC, Blackberry, Sony, or even a Fairphone? No. I want something that's fit for work, low on frills, and secure. A "Merkel phone" perhaps? Yes, perhaps. That's a Blackberry running SecuSUITE encryption software. The German … [Read more...] about Review: the Blackphone 2 is ‘private by design’ but how does it handle?
It's no secret that German Chancellor Angela Merkel likes to use her mobile phone - or that she uses it often for government business. The secret is - or at least it has been presumed - the content and people involved in the calls, text messages and emails. Merkel's mobile as well as those of other government officials were thought to be immune to surveillance, until accusations by the German newsmagazine "Der Spiegel" on Wednesday (23.10.2013) that the National Security Agency (NSA), a US intelligence agency, was listening in on the chancellor's phone. Though government officials will not confirm the brand of phone, several photos show Merkel typing out many text messages on what appears to be a Nokia phone. But Merkel reportedly also had a second phone in addition to the one she keeps for official government business. The phone reportedly spied on by the US was not classified as tamper-proof, a spokesman for the Federal Office for Information Security told the daily … [Read more...] about How safe is Merkel’s mobile?