Close
  • Français
  • English

Themes

Imagine two universes.  In the first one, information systems are impervious to manipulation from the outside.  No unauthorized person one can change the instructions that systems run and systems react to all input as they are supposed to (that is, consistent with the common understanding of designers and users).  This is a world in which…

Read More

[box style=’note’] Summary Large-scale criminal use of crypto-currency poses significant risk because of a lack of universal regulation, a gap in critical industry-based checks against money laundering, a decentralized administration, and the anonymity of internal crypto-currency transactions. The use of crypto-currency in the sale of illegal narcotics as well as other illicit goods and to…

Read More