Artwork

内容由Emsisoft提供。所有播客内容(包括剧集、图形和播客描述)均由 Emsisoft 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Cryptocurrency Tracing and the Fight Against Cybercrime, with Andy Greenberg

54:45
 
分享
 

Manage episode 416821690 series 3455034
内容由Emsisoft提供。所有播客内容(包括剧集、图形和播客描述)均由 Emsisoft 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

This month’s guest on the Cyber Insider is Andy Greenberg. Andy is a senior writer for WIRED who has covered hacking, cybersecurity and surveillance for 17 years. He’s the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency and the 2019 book Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. The two books and excerpts from them published in WIRED have won numerous awards including two Gerald Loeb Awards for distinguished business and financial reporting, a Sigma Delta Chi Award from the Society of Professional Journalists, and the Cornelius Ryan Citation for Excellence from the Overseas Press Club. His 2012 book, This Machine Kills Secrets: How WikiLeakers, Hacktivists and Cypherpunks Aim to Free the World’s Information, was named one of the top ten “greatest tech books of all time” by The Verge.

Bitcoin, the first and most well-known cryptocurrency, was initially believed to be an untraceable form of digital cash. However this assumption turned out to be far from the truth. The public nature of the blockchain, the underlying technology behind bitcoin, allows for the traceability of every transaction. By analyzing transaction patterns and clustering addresses, it became possible to trace the flow of cryptocurrency and connect it to real-world identities.

"Every bitcoin transaction is recorded in the blockchain. That is how bitcoin functions. Instead of a bank or any other authority kind of tracking every transaction in a big database, that database is public and it's copied out to thousands and thousands of computers around the world."

By following the traces, investigators have been able to identify and apprehend cybercriminals involved in activities such as ransomware attacks and the sale of illegal goods on the dark web. However, the fight against cybercrime is an ongoing battle. As criminals adapt and develop new techniques, law enforcement and cybersecurity professionals must stay one step ahead. Greenberg emphasizes the importance of a multi-faceted approach that includes not only tracing cryptocurrency but also increasing the resilience of potential victims and implementing stricter regulations on exchanges and mixing services.

As the world of cryptocurrency continues to evolve, it is essential to recognize the traceability of transactions and the potential for law enforcement to leverage this information in the fight against cybercrime. By understanding the capabilities and limitations of cryptocurrency tracing, we can work towards a safer and more secure digital landscape.

All this and much more is discussed in this episode of The Cyber Insider podcast by Emsisoft, the award-winning cybersecurity company delivering top-notch security solutions for over 20 years.

Be sure to tune in and subscribe to The Cyber Insider to get your monthly inside scoop on cybersecurity.
Hosts:
Luke Connolly – partner manager at Emsisoft
Brett Callow – threat analyst at Emsisoft
Intro/outro music: “Intro funk” by Lowtone.

  continue reading

18集单集

Artwork
icon分享
 
Manage episode 416821690 series 3455034
内容由Emsisoft提供。所有播客内容(包括剧集、图形和播客描述)均由 Emsisoft 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

This month’s guest on the Cyber Insider is Andy Greenberg. Andy is a senior writer for WIRED who has covered hacking, cybersecurity and surveillance for 17 years. He’s the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency and the 2019 book Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. The two books and excerpts from them published in WIRED have won numerous awards including two Gerald Loeb Awards for distinguished business and financial reporting, a Sigma Delta Chi Award from the Society of Professional Journalists, and the Cornelius Ryan Citation for Excellence from the Overseas Press Club. His 2012 book, This Machine Kills Secrets: How WikiLeakers, Hacktivists and Cypherpunks Aim to Free the World’s Information, was named one of the top ten “greatest tech books of all time” by The Verge.

Bitcoin, the first and most well-known cryptocurrency, was initially believed to be an untraceable form of digital cash. However this assumption turned out to be far from the truth. The public nature of the blockchain, the underlying technology behind bitcoin, allows for the traceability of every transaction. By analyzing transaction patterns and clustering addresses, it became possible to trace the flow of cryptocurrency and connect it to real-world identities.

"Every bitcoin transaction is recorded in the blockchain. That is how bitcoin functions. Instead of a bank or any other authority kind of tracking every transaction in a big database, that database is public and it's copied out to thousands and thousands of computers around the world."

By following the traces, investigators have been able to identify and apprehend cybercriminals involved in activities such as ransomware attacks and the sale of illegal goods on the dark web. However, the fight against cybercrime is an ongoing battle. As criminals adapt and develop new techniques, law enforcement and cybersecurity professionals must stay one step ahead. Greenberg emphasizes the importance of a multi-faceted approach that includes not only tracing cryptocurrency but also increasing the resilience of potential victims and implementing stricter regulations on exchanges and mixing services.

As the world of cryptocurrency continues to evolve, it is essential to recognize the traceability of transactions and the potential for law enforcement to leverage this information in the fight against cybercrime. By understanding the capabilities and limitations of cryptocurrency tracing, we can work towards a safer and more secure digital landscape.

All this and much more is discussed in this episode of The Cyber Insider podcast by Emsisoft, the award-winning cybersecurity company delivering top-notch security solutions for over 20 years.

Be sure to tune in and subscribe to The Cyber Insider to get your monthly inside scoop on cybersecurity.
Hosts:
Luke Connolly – partner manager at Emsisoft
Brett Callow – threat analyst at Emsisoft
Intro/outro music: “Intro funk” by Lowtone.

  continue reading

18集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南