Category Archives: Security

False Articles Plaguing the Swedish Election

A study by the Oxford Internet Institute revealed that one in three news articles that are shared on the micro-blogging site about Sweden’s 2018 election was from junk news websites which deliberately publish false articles and misleading information. Similar ratio was observed in 2016 US Presidential Elections The study examined around 275,000 tweets about Sweden’s […]

Read more

RKN Global on: Join Twitter Before 13? You May Be Blocked

Users who signed up before age 13 could be banned According to Twitter, the ban will apply whether the users added their birth dates to their profiles later or provided their date of birth at the time of signing up. The news site Motherboard reports that Twitter has opted to ban users whose provided birth […]

Read more

Is the Anonymity of a Cryptocurrency a Good Thing or a Bad Thing?

Governments and regulatory authorities such as central banks were initially opposed to the idea of decentralized cryptocurrencies. This reaction was warranted by factors like their loss of control over the regulation of money, and more prominently, by concern about the use of cryptocurrency for illegal purposes. The fight against illegal activities Governments believe that cryptocurrencies […]

Read more

Chinese Police Discover Yet Another Crypto Scam

It seems as if crypto scammers are done with petty theft and only move massive numbers about these days. The worst part is that even though they often do get caught in the end, it is difficult for victims to get their money back. Da Tang Coin (DTC) Holding is the latest scam in China […]

Read more

Anonymity and Cryptocurrencies – The Future or the Past?

Anonymous v Private Anonymity is one of the hottest topics in relation to cryptocurrency. There is a difference between anonymous transactions and private transactions (Some prefer to use the term pseudonymous instead of the word “anonymous”). Anonymous transactions are ones where your transactions can actually be seen, but the identity of the person is hidden. […]

Read more