Financial Cryptography

Where the crypto rubber meets the Road of Finance...
Recent Entries
  • REA - some thoughts on relationship to TEA & computer science
  • Russian Dolls - a design pattern for end to end secure transactions
  • Bayesian Security Compromise
  • Thoughts on momentum accounting
  • Cryptojacking Malware Devs Sentenced to 20 Years in Prison
  • HTTPS reaches 80% - mission accomplished after 14 years
  • Matrix of 4 Types of Identity
  • Financial exclusion and systemic vulnerability are the risks of cashlessness
  • PKI certs are a joke, edition 2943
  • 4 Types of Identity
  • None of us love terrorists
  • How does the theory of terrorism stack up against AML? Badly - finally a case in Kenya: Dusit
  • Gresham's Law thesis is back - Malware bid to oust honest miners in Monero
  • ID Dox - now it's getting personal - Andreas spoofed
  • AES was worth $250 billion dollars
  • Market for Scans
  • Financial Cryptography and Data Security 2019
  • Zooko buys Groceries...
  • Shocking trade in stolen UK passports (really??)
  • FCA on Crypto: Just say no.
  •     FC++ #3    
    Mark Miller Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control Software Engineering, Rights
    Philipp Gühring Concepts against Man-in-the-Browser Attacks Software Engineering
    Risk (Security)
    Threats
    Ian Grigg The Market for Silver Bullets Economics
    Risk (Security)
    FC++: #1, #2 #3
    Search


    Security Top Tips
    1. Buy a Mac $499 ... And $899 defeats keyloggers
    2. Use another browser Bank on one browser, browse on another.
    3. Write Passwords Down
    In a safe place... (use common sense)

    7-Layers
    7
    Finance
    Enhyper .. Blogshares .. Stakeout .. FC on Finance ..
    6
    Value
    epointsystem and blog .. Bob's Gold Price .. Linkdump .. Beyond Money (Tom Greco) .. Digital Money (Dave Birch) .. FC on Value ..
    5
    Governance
    Perilocity .. ICANN Watch .. Discourse .. Mason on e-signatures and e-evidence .. FC on Governance .. on Digital Signing .. Dispute Resolution and Negotiation
    4
    Accounting
    Ledgerism - the origin of triple entry: What is a transaction? .. and the Shared Transaction Repository. Sounds familiar? Triple Entry Accounting .. FC on Accounting
    3
    Rights
    ERights .. the Ricardian contracts & Wikipedia on the Riccy .. CAcert's assurance and dispute .. Digital Identity Forum .. FC on Rights .. on Identity .. and Identity Cost ..
    2
    Software
    Engineering

    Pelle Talk .. Jabber .. WebFunds .. Gunnar Peterson .. FC on SoftEng ..
    1
    Crypto
    FC on Crypto ..
    Categories
    Meta Refs on Security .. FC Knowledgebase .. FC meta .. FC teams&HR .. FC pennies
    Conf & Pubs WEIS .. Dave Birch's Digital Money and Identity and Privacy .. IACR calendar .. FC Conferences ..
    Risks
    & Sec

    (Adam, Arthur, Chris, Mordaxus) Emergent Chaos .. Adi Shamir's 3 laws .. Kerckhoffs' 6 principles .. Tao of Security .. Not Bad For a Cubicle .. CAcert .. Ping's Usable Security .. Gunnar Peterson's 1 Raindrop .. FC Cost of Identity .. FC risks&sec .. FC threats
    Econ
    Anderson's Econ & Sec .. Econ in 1 Lesson, Mises, Hayek .. Unenumerated Nick on Law .. WEIS Biblio .. FC econ .. FC stats
    The
    registry
    of
    transcendent
    financial
    cryptogrophers
    Dave Birch .. Todd Boyle .. Martin Hasan Bramwell .. Stefan Brands .. Graeme Burnett .. James Donald .. Hal Finney .. Amir Herzberg .. Bob Hettinga .. Iang .. Dan Larimer .. Simon Lelieveldt .. Stephen Mason .. Mark Miller .. Dani Nagy .. Satoshi Nakamoto .. James Nesfield .. Chris Odom .. Frank Trotter .. Pelle .. Twan van der Schoot .. Nick Szabo .. Anne & Lynn Wheeler .. Jörg Wittenburger .. Joseph Vaughn Perling (JVP) .. Rachel Willmer .. Zooko ..
    Syndicate this site (XML)
    Creative Commons License
    This weblog is licensed under a Creative Commons License.
    Powered by
    Movable Type 2.64
    |sonance|network|