What exactly is North Korea doing with Monero?
Wednesday, January 10, 2018
"Analysts at cybersecurity firm AlienVault discovered a new malware application that uses compromised machines to generate a bitcoin-like cryptocurrency called Monero."
"The Fed sent about $80.2 billion to the government last year, and net income totaled $80.7 billion, an $11.7 billion decline from 2016, according to preliminary results of the Fed’s annual financial statements."
"In those countries and corners of the financial system where the traditional services of money are inadequately supplied, Bitcoin (and cryptocurrencies more generally) may offer viable alternatives."
"A regulatory oversight consortium would propose multi-agency rules for tokens, addressing their dual role in capital raising and eventual transactions as a secondary instrument.This could create a pathway for perhaps an integrated hybrid token, one which is not only a security but also maintains a derivative utility function and or an alternate currency status, which may settle the utility vs. security vs. commodity debate."
"The rise in cryptocurrencies has corresponded with a bull market in stocks. And while cryptocurrencies have experienced a number of bear markets and crashes over the past few years on their way to remarkable gains, we have yet to see how they will handle a bear market in stocks."
"How will we meet the looming challenges of the twenty-first century? We can work even harder to master the planet with technological ingenuity. Or we might need to accept that our desires can’t be unlimited, and see ourselves as citizens of a larger-than-human community, rather than as world conquerors."
"The launch drew massive attention with a crafty announcement that SALT, the platform’s native token, could be used to repay loan principal as well as interest. This appeared to open up a massive arbitrage opportunity as SALT was trading on exchanges at well under $20, while it was redeemable at a fixed $27.50 on the SALT platform."
"The consensus layer accidentally interferes with dApps all the time. But sometimes it can reach up and interfere deliberately. The consensus layer is controlled by miners. Miners work for money. The consensus layer will only support the application layer as long as it’s profitable to do so."
"What this new standard introduces is a major solution to a common security problem. Most consumers are comfortable using open Wi-Fi networks, despite the security risks they present. Unprotected networks can be hijacked by criminals who can then snoop on all internet data passing through the hijacked hotspot."