Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • More on Domestic Spying

    I really enjoy reading William Arkin’s Early Warning blog. Our opinions on the intel business don’t always jibe (96Bs and 98Cs will never get along all that well) but in his latest post he hits what I think is a home run: And sorry for being cynical, but when I lived in Washington, from 1978-1993,…

  • Data Mining/OSINT on the Cheap

    Very clever. Makes me wish I’d kept up my script-writing skillz. http://www.applefritter.com/bannedbooks

  • On Sources

    Thomas Joscelyn writes in the Weekly Standard about James Risen and his sources: On NBC’s “Today” show this morning, New York Times scribe Jim Risen told Katie Couric that he hopes he will not have to reveal his sources to a grand jury and declared his story to be the exact opposite of the Plame…

  • Drip, Drip, Drip

    Given my background I may be slightly biased, but I’ve never been a big fan of leakers of classified information. The whole point of keeping stuff classified is that it isn’t supposed to be out on the front page of the NY Times. That we tend to over-classify things is another issue. The bottom line…

  • Dangers of GI Blogs

    From Newsday: Letters home filled with tales of death and danger, bravery and boredom are a wartime certainty. And now, as hundreds of soldiers overseas have started keeping Internet journals about the heat, the homesickness, the bloodshed, word speeds from the battlefront faster than ever. More and more, though, U.S. military commanders in Iraq and…

  • Pshaw!

    And they said that no one from the JTF would ever amount to anything:   The spookiest venture capital firm on the planet has hired a new CEO. In-Q-Tel – the CIA’s venture capital unit – has tapped Amit Yoran as the successor to Gilman Louie, according to a report in the Washington Business Journal.…

  • Post Holiday Catch-Up

    Such an effort is almost a waste of time (almost) since you’re starting long after the gun has gone off, but it is a nice way to reboot the mental OS out of hibernation and get back into the swing of things. So, where to begin?This gem from Reuters is a nice starting point: A…

  • It just came to me . . .

    . . . another reason why the polygraph isn’t a very good tool for screening out potential spies and leakers: Clearly the people who are leaking about Plame, the rendition program, NSA interceptions, etc. are in positions that require periodic testing. Either their kung fu is so strong they can’t be accurately read by the…

  • PATRIOT Act Extension (Sort of)

    A month is what the House thinks is appropriate: The House of Representatives agreed to extend a controversial domestic surveillance law this afternoon, but it limited the extension to one month and rejected a carefully brokered compromise from the Senate that had given the law a six-month reprieve. Prediction I: Post-holiday showdown takes place on…

  • WaPo DHS Expose

    A great start to what is going to be a multi-part series on DHS in the WaPo today: Born out of the attacks of Sept. 11, 2001, DHS was initially expected to synthesize intelligence, secure borders, protect infrastructure and prepare for the next catastrophe. For most of those missions, the bipartisan Sept. 11 commission recently…

  • Imperfect System = Tortured Solutions

    Much rending of hair and gnashing of teeth has been taking place since a leak in the New York Times revealed the existence of a Presidentially authorized secret program to intercept and exploit the communications of suspected terrorists that might be operating in the US. Under a presidential order signed in 2002, [NSA] has monitored…

  • Hezbollah.com

    Via Judeoscope: [Hezbollah] — regarded by many as even more sophisticated than al-Qaeda — has sharpened its counterintelligence expertise over the years by keeping a step ahead of Mossad, Israel’s secret service. [They have] become ever more adept at intercepting electronic surveillance, penetrating cellphone networks and recruiting computer science technicians. “Hezbollah has a long history…

  • Unrestricted Warfare

    The following selections are taken from “Unrestricted Warfare,” a book published in China in February 1999 which proposes tactics for developing countries, in particular China, to compensate for their military inferiority vis-à-vis the United States during a high-tech war. The selections include the table of contents, preface, afterword, and biographical information about the authors printed…

Briefs

  • Two-thirds of South Sudan at risk of severe hunger in 2023 – UN

    On Thursday, United Nations agencies stated that as many as 7.8 million people in South Sudan could face sever food shortages during April to July in 2023. The two-thirds of the population is expected to experience these shortages due to floods, drought and conflict in the country.  The shortages in the country now are worse…

  • Zelensky accuses Russia of ‘energy terrorism’

    Russia has made a few gains on the battlefield and Ukrainian President Volodymyr Zelensky has accused the Kremlin of energy terrorism. After Russian attacks on Ukraine’s energy network, 4.5 million people were left without power. These strikes come as Russian troops are expected to withdraw from the southern city of Kherson.  In the last month,…

  • The metaverse ushers in a new era of cyber threats

    The reality of the metaverse, where builders aim to create a shared, immersive and interactive digital world that combines virtual reality (VR) and augmented reality (AR) with avatars, digital twins and Internet of Things (IoT) devices, is only a few years away. With all the chatter about the metaverse, many are beginning to get an…

  • With Hacks at a Record High, Crypto Needs to Find Better Ways to Keep Users Safe

    The figures are in: October was the busiest month for crypto protocol exploits this year, with some $760 million stolen. The cumulative total for crypto hacks in 2022 is now at least $2.98 billion, already more than double the amount stolen through exploits in 2021, according to blockchain security firm Peckshield. Peckshield released those figures…

  • Skyward finance exploit allegedly results in $3M loss

    Skyward finance, an initial DEX offering (IDO) platform enabling fair token distribution for projects on the Near Protocol, has reportedly been exploited for 1.1 million Near Protocol NEAR tokens, worth an estimated $3 at time of publication. The news was shared on Twitter by Aurora Lab’s community moderator Sanket Naikwadi, who stated that the exploit…

  • Cryptocurrency and how it impacts the environment

    Bitcoin, the first ever cryptocurrency, was established in 2009 has grown in value astronomically according to Forbes. Forbes estimates that if you invested $1,000 in Bitcoin when it first launched, it would be worth $41.5 million today. As Bitcoin and other cryptocurrencies have grown, environmentalists like CWU Biology Professor Dr. Clay Arango have voiced concerns about…

  • The Ringleader of a Dark Web Drug Ring Who Laundered $2.3 Million in Crypto Was Given a Nine Year Sentence

    The ringleader of a dark web drug drug trafficking operating was sentenced to nine years in state prison on Nov. 2, said Manhattan District Attorney Alvin Bragg in a statement. Chester Anderson, 48, sold hundreds of thousands of Xanax tablets and other controlled substances to buyers across the country through two dark web storefronts, in addition…

  • Pakistan ex-Prime Minister Imran Khan shot and wounded at protest march

    Imran Khan, Pakistan’s former prime minister, was shot and wounded in the leg during an attack on his protest in Wazirabad, Pakistan. It remains unclear whether Khan was deliberately targeted or if he was the victim of stray or indiscriminate gunfire. Members of Khan’s PTI party confirmed that four other people were hurt in the…

  • Religious Minority Persecuted in Iran Targeted With Sophisticated Android Spyware

    Kaspersky has warned of a previously undetected espionage campaign that is targeting the Persian-speaking religious minority Baha’i. The campaign is leveraging Android spyware to target the group with a malicious VPN application that claims to provide access to Baha’i religious resources that are banned in Iran. The application contains highly sophisticated spyware, Kaspersky says. The…

  • Pyongyang fires suspected ICBM

    North Korea has fired an intercontinental ballistic missile that sparked an alert in Japan. The missile failed mid-flight and landed in the sea. There are escalating tensions in the region as there are fears that North Korea will soon conduct a nuclear test. After both South and North Korea fired missiles near each other’s waters…

  • Warring parties in Ethiopia agree on ‘permanent cessation of hostilities’

    The Tigray People’s Liberation Front and the Ethiopian government have agreed to permanently end hostilities. This is a significant step towards ending the wr that has killed thousands and displaced millions. In a join statement, the two sides announced on Wednesday that they would end the two years of conflict.  The Tigray revels will eventually…

  • Android Apps With a Million Downloads Led Users to Phishing Sites

    Security experts at Malwarebytes have discovered a group of four apps totaling millions of downloads overall that have been infected with the HiddenAds malware. The apps are listed on google Play and were published by Mobile apps Group. The apps pertain to Bluetooth functions such as ‘Bluetooth Auto Connect’ and ‘Bluetooth App Sender.’ Malwarebytes detailed…

  • Bot Warning for Retailers Ahead of Busy Shopping Season

    Imperva has released a new report titled State of Security Within eCommerce 2022. The report was created based on data gathered from the vendor’s engagements and activities within the eCommerce sector. The report warns that retailers should prepare for a surge in bot-driven account takeover attempts, DDoS attacks, card fraud, and more as the holiday…

  • Mobile Phishing Attacks on Government Staff Soar

    Security firm Lookout has detailed a slew of mobile-based credential theft attacks that have been targeting federal government employees. The attacks have increased by 47% between 2020 and 2021, the security researchers state. This exposes agencies to a serious risk of breaches as it only takes one employee to fall for the phishing attempts. The…

  • How DeFi has contributed to its own collapse by ignoring security and using poor tokenomics

    Early in 2021, decentralized finance (DeFi) drove the explosive expansion of cryptocurrencies, but since then, the value of the crypto market has collapsed. Global markets and developers’ carelessness with regard to cybersecurity and (sometimes self-serving) inflationary token structures have both played a part. Too much DeFi has been built on tokens created out of thin air…

  • DeFi Protocol Solend Struck by $1.26M Oracle Exploit

    Solana-based decentralized finance (DeFi) protocol Solend has suffered an exploit in relation to pricing oracles, resulting in $1.26 million in bad debt. The exploit was centered around the hubble stablecoin (USDH) and affected the Stable, Coin98, and Kamino lending pools, according to a tweet by Solend. A pricing oracle is a source of data that…

  • $28M stolen from cryptocurrency exchange Deribit, details inside

    Cryptocurrency options and futures exchange Deribit has been hacked, with $28 million being drained from its hot wallet. During an appearance on CoinDesk TV on Wednesday, Deribit’s chief commercial officer, Luuk Strijers, said client assets have not been affected but withdrawals have been temporarily halted as the exchange makes security checks. “Hackers have gained access…

  • Binance CEO sees no threat to crypto from central banks’ digital currencies

    Plans by central banks to launch digital currencies are not a threat to other cryptocurrencies as they would validate blockchain technology and build trust among sceptics, the CEO of the world’s largest crypto exchange, Binance, said on Wednesday. Most major central banks, including the U.S. Federal Reserve, the Bank of England and the European Central Bank,…

  • Moneygram to enable users to buy, sell and hold cryptocurrency via mobile app

    Global digital peer-to-peer payments company MoneyGram announced on Nov. 1 that users in nearly all U.S. states and the District of Columbia, can buy, sell, and hold cryptocurrency, specifically Bitcoin , via its MoneyGram mobile app. The digital payments company said that it plans to add more digital currencies to its app in 2023, as global regulations…

  • China-Backed APT10 Supercharges Spy Game With Custom Fileless Backdoor

    Security researchers at Kaspersky have identified a Chinese-speaking threat actor called APT10 deploying sophisticated and fileless backdoors. The attacks are targeting think-tanks, media, diplomatic, governmental, and public sector organizations. Kaspersky states that the campaign has been active since at least March. The company has been tracking the LodeInfo malware family since 2019 and detailed the…

  • UN troops in DRC make ‘strategic withdrawal’ from key army base

    The United Nations peacekeeping mission in the Democratic Republic of the Congo has ceded ground in the battle against the M23 rebel group. Troops have been withdrawn from the eastern military base of Rumangabo. The UN troops have been supporting Congolese forces in a battle against the M23. M23 launched a new offensive in October…

  • Bed Bath & Beyond Investigating Data Breach After Employee Falls for Phishing Attack

    Bed Bath & Beyond, a large retailer, confirmed in an SEC filing last week that it suffered from a data breach after an employee fell for a phishing attack. The retailer has only revealed a few details as it works to investigate the full extent of the attack. Bed Bath & Beyond stated that it…

  • South hits back as North Korea fires most missiles in a day

    In an escalation of hostilities, North and South Korea have fired a number of missiles into waters near each other. North Korea launched at least 23 missiles, its most in a single day, including one that landed less than 60km off the coast of South Korea’s city of Sokcho. Seoul responded with warplanes firing three…

  • Osaka Hospital Halts Services After Ransomware Attack

    In Osaka, Japan, a major hospital has suspended routine medical services due to a ransomware attack that has disrupted the facility’s electronic medical record systems. Emergency operations are continuing, the medical center told reporters. However, the hospital system failed earlier this week and could not be accessed. The Osaka General Medical Center has contacted a…

  • Twitter Verified Status Users Flooded with Scams

    Since Elon Musk’s arrival as the new owner of Twitter, verified users have reported an influx of phishing attempts via email and on the platform itself. Elon Musk has fired Twitter’s board to become the sole director and wants to initiate a big change to the way the platform handles verified users. Musk wants to…

  • White House Invites Dozens of Nations for Ransomware Summit

    The White House has invited three dozen nations, the European Union, and several private-sector companies to join a two-day summit that was discuss ransomware attacks and how to best address them. This is the second time that the International Counter Ransomware Summit has occurred, and this year’s addresses will focus on priorities such as ensuring…

  • Implementing blockchain: Why a security strategy must come first

    More industries are incorporating blockchain applications into their business, drawing the attention of threat actors — like the recent Axie attack, for example. As a result, many cybersecurity professionals are now finding they are responsible for securing blockchain systems. Unfortunately, even skilled cybersecurity professionals are ill-equipped to secure blockchain applications because it and other decentralized…

  • We’re Going Through A Machine Identity Crisis

    Zero trust is an acknowledgment that legacy network controls like firewalls and VPNs are not enough to secure the enterprise. This has become increasingly true due to digital transformation, cloud computing and DevOps trends. The framework is built on the notion of “never trust, always verify” and views trust as a vulnerability. This has left identity…

  • Crypto-Linked Terror Attacks Probably Quadrupled, UN Official Says: Report

    Crypto-financed terror attacks probably quadrupled in the past few years, according to a United Nations official interviewed by Bloomberg. Svetlana Martynova, a senior legal officer at the United Nations Counter-Terrorism Committee Executive Directorate, said that a couple of years ago 5% of terrorist attacks were viewed as crypto-financed or linked to digital assets. “Now we’re…

  • Cryptocurrency Industry Regulation Proposals by the Market Players

    In view of the recent publishing by the Financial Stability Board (FSB) of the report on the proposed framework for international regulation of the cryptocurrency industry, which was a result of FSB’s research of the topic as was mandated by the G20, some market players also have expressed their thoughts on this hot topic. The FSB’s…

  • 14 years since the Bitcoin white paper: Why it matters

    Happy white paper day, Bitcoin. It’s been 14 years since Satoshi Nakamoto first sent an email to the Cypherpunk mailing list with the subject line, “Bitcoin P2P e-cash Paper.” The email included a link to the white paper, an outline of what would soon become a one trillion-dollar market. The first sentence of the email…

  • Label Giant Multi-Color Corporation Discloses Data Breach

    Multi-Color Corporation, a label printing giant, has confirmed to employees that the company has suffered from a cyberattack that may have compromised employee information. MCC operated 100 label producing operations and is a global supplier of label solutions. The company boasts roughly 10,000 employees and offers its services to the food, chemicals, healthcare, beverage, automotive,…

  • FTC Takes Enforcement Action Against EdTech Giant Chegg

    The Federal Trade commission (FTC) has filed legal action against Chegg, a popular EdTech player, due to allegations that the firm has not protected its customers from data breaches. Chegg has suffered from four data breaches since 2017, and the FTC reports that the company has taken shortcuts with the personal data of its customers,…

  • Hackers Target Australian Defense Communications Platform With Ransomware

    Threat actors have launched a ransomware attack targeting a communications platform that is used by Australian military personnel. The platform, ForceNet, is one of the company’s external service providers and is also tasked with runnning one of its websites. Assistant Minister for Defence Matt Thistlethwaite stated that it does not appear that any data was…

  • Leaders head to Algeria for first Arab League summit in two years

    The first Arab League summit since the COVID-19 pandemic will begin in Algeria, amid continuing political divisions among the organization’s members. Arab states are split over many issues including support for the Palestinian cause, the rehabilitation of Syria’s President Bashar al-Assad, the regional roles of Iran and Turkey and Algeria’s feud with Morocco.  Algeria has…

  • Bolsonaro remains silent after Brazil presidential election loss

    Luiz Inacio Lula da Silva was announced to be the winner of Brazil’s 2022 presidential election, beating incumbent Jair Bolsonaro. More than 24 hours after the election results were announced, Bolsonaro has not yet publicly acknowledged his loss. The delay has created concern that he will not cooperate with a transfer of power.  After the…

  • More Than 130 People Dead in Cable Bridge Collapse in India’s Gujarat State

    On Sunday, a bridge in the Indian state of Gujarat collapsed, killing more than 130 people. The bridge had been closed for renovations until recently and is a popular attraction. The government of Gujarat has opened a criminal inquiry pertaining to the agency tasked with maintaining the bridge. The investigation was opened on manslaughter charges.…

  • Google Introduces Cloud-Based Blockchain Node Service for Ethereum

    Tech giant Google said Thursday it will be launching a cloud-based node engine for Ethereum projects. The company said its Google Cloud Blockchain Node Engine will be a “fully managed node-hosting service that can minimize the need for node operations,” meaning that Google will be responsible for monitoring node activity and restarting them during outages.…

  • Hong Kong Government Reconsiders Stance on Virtual Asset ETFs, Tokenized Securities, Retail Investors

    Hong Kong’s Financial Services and Treasury Bureau issued a policy statement on virtual assets at the opening of the city’s flagship tech conference Hong Kong FinTech Week on Monday. Hong Kong is “ready to engage” with global virtual asset service providers and invite them to the city, the statement says. The jurisdiction’s Legislative Council is…

  • Chainalysis Sees Growing Push for Crypto Regulation Amid Record Hacks

    Crypto, which was born during the 2008-2009 financial crisis, is about to see how it handles the next one. That is something Michael Gronager, CEO of blockchain data firm Chainalysis, finds very interesting, he told PYMNTS recently. The idea was, basically, to build this very transparent value transfer network — non-censorable, everyone had access, very open…

  • Relationship Between Blockchain and Cryptocurrency

    Whenever the word blockchain is used, cryptocurrency automatically comes to mind, and it’s true the other way as well. Many people believe that the two are synonymous and, thus, are often used interchangeably, but it couldn’t be more wrong. Cryptocurrencies are a type of money that use blockchain technology to operate. Blockchain was first introduced…

  • Ransomware hackers hit Australian defence communications platform

    Hackers have targeted a communications platform used by Australian military personnel and defence staff with a ransomware attack, authorities said on Monday, as the country battles a recent spike in cyberattacks across businesses. The ForceNet service, one of the external providers that the defence department contracts to run one of its websites, has come under…

  • South Korea Halloween Tragedy Claims Mostly Young Revelers

    On Saturday night, 154 individuals died in the Itaewon district of Seoul, South Korea when a narrow alleyway that was overcrowded with Halloween party goers caused crowd crush. South Korean authorities are currently investigating the tragedy that took the lives of so many people, most of whom young adults. New information about the incident has…

  • Cranefly Cyberspy Group Spawns Unique ISS Technique

    Security researchers have found that the hacking group Cranefly is deploying new techniques that leverage Internet Information Services (IIS) commands to deliver backdoors to targets. The technique has been used in intelligence gathering campaigns perpetrated by the hacking group. Security researchers at Symantec detailed the tactic, which uses a previously unidentified Trojan dubbed Geppei. The…

  • Hundreds of Iranian journalists call for the release of two colleagues jailed in Evin prison

    Hundreds of Iranian journalists are calling for Iran to release their colleagues Niloofar Hamedi and Elaheh Mohammadi from Tehran’s Elvin prison. The two journalists were arrested for covering the death of Mahsa Amini. A statement was signed by over 300 journalists, photographers and media activists calling for their release and for media freedom.  The recent…

  • Explosions near Somalia’s education ministry kill 100 people

    Two car bombs explorded near the education ministry in Somalia’s capital Mogadishu, killing at least 100 people. Over 300 other people were wounded in the attack on Saturday. Somali President Hassan Sheikh Mohamud claimed the al-Shabaab terror group in Somalia was responsible.  Al-Shabaab has not immediately claimed the attack, however, they have claimed other recent…

  • Russia Suspected in Truss Phone Hacking Scandal

    Earlier this year, former UK Prime Minister Liz Truss’s personal phone was found to be infected by spyware distributed by foreign agents. This posed a signification national security risk, the UK stated. the incident was discovered over the summer during the Conservative Party leadership contest. Truss worried that the spyware may impact her chances of…

  • Europe’s Biggest Copper Producer Hit by Cyber-Attack

    Aurubis, the world’s second largest copper producer, suffered from a cyberattack that forced IT systems offline, the company stated. The company is located in Hamburg and released a statement confirming the attack. The attack reportedly occurred on Friday evening and was part of a larger attack targeting the mining industry. The company confirmed that numerous…

  • Microsoft Authenticator gains feature to thwart spam attacks on MFA

    Microsoft has launched a new number matching feature in push notifications to help bolster its multi-factor authentication. The feature applies to the MFA app, Microsoft Authenticator. The new feature is available now and should help combat attacks that rely on push notification spam, the company says. The new feature comes after researchers identified attacks targeting…

  • How cyber secure is blockchain technology?

    Blockchain technology has significantly changed the way in which traditional networks operate. It is based on the concepts of cryptography, decentralisation and consensus, which have revolutionised record-keeping. Aside from improving the speed and efficiency of transactions, it provides many security benefits through cryptographic validation and improving the transparency of records. The misconception, however, is that…

  • The Dangerous Flaws of Web3 Security, According To a Former Hacker

    “New and improved” is the refrain of progress, but new technology doesn’t always turn out to be an improvement. In the case of the evolution from Web2 to Web3, a former hacker revealed how recent changes have created an all-new avenue of potential attack. Recent updates were intended to tighten security. “Due to blockchain technology…

  • Best practices for cryptocurrency firms and digital currency firms managing money

    A Consent Order issued in August 2022 by the New York State Department of Financial Services (“NYDFS”) for a $30 million fine on Robinhood Crypto, LLC (“RHC”) shows that cryptocurrency firms are not immune from regulatory and legal obligations. The Consent Order can be read as a partial roadmap for similar firms in establishing best…

  • Hacker steals US$1mn worth of crypto and NFTs 24 hours

    A hacker known as Monkey Drainer has stolen US$1mn worth of Ethereum and NFTs in a hacking spree across just 24 hours. The hack was reported by Twitter user ZackXBT who describes themselves as a “crypto sleuth” and a “rug pull survivor turned 2D detective”. A rug pull is a scam which sees malicious actors…

  • Cryptocurrency Scams: How to Spot & Protect Yourself Against Crypto Fraud

    Cryptocurrency is a new, exciting way to interact with money. However, scammers are looking to take advantage of people who don’t know how to navigate this new and often complex world. Cryptocurrency scams have become the new fraud of choice for cybercriminals looking to make a quick buck. Cryptocurrency scams are a form of financial fraud…

  • LinkedIn Unveils New Security Features to Tackle Fraud

    Business social media company LinkedIn has reportedly launched a new series of features that aims to take down fake profiles and malicious use of the platform, which is designed to allow professionals to connect with others. The firm announced the new measures in a blog post on Tuesday. The blog post also contained details about…

  • Twilio Reveals Further Security Breach

    Twilio, a communication tool provider, has confirmed that a data breach that occurred in July had more implications than previously recognized. The same malicious actors that compromised the firm in July were also responsible for a breach the month prior that exposed customer information, the company says. The firm released an incident report that was…

  • GitHub Bug Exposed Repositories to Hijacking

    Security researchers have identified a flaw in GitHub that reportedly enables attackers to take control of repositories, thus allowing them to spread malware and infect code. GitHub has fixed the bug since it was discovered and stated that it lied in the popular repository namespace retirement feature. The same tool could be targeted by threat…

  • Nigeria ups security as US orders diplomats’ families to leave

    Nigeria’s police have stated they are boosting security in the capital, as the United States has ordered the families of diplomats in the area to leave due to a heightened concern of terrorist attacks. The details of any threat were not known on Friday, however, residents of the Federal Capital Territory have been instructed to…

  • Russia ends civilian pull-out before Kherson battle

    According to Russian officials, they have completed an operation to move civilians out of the city of Kherson in southern Ukraine, ahead of a battle with Ukrainian forces. At least 70,000 civilians have crossed the Dnipro river. Russia claims to be preparing Kherson for defense,.  The Kherson region was one of the territories of Ukraine…

  • Warning on blockchain security risk

    Blockchain – the shared and binding ledger that records online financial transactions and tracks a business network’s assets – is not as secure as its image suggests, according to researchers from University of Gloucestershire. Sepideh Mollajafari, a blockchain security expert at the University’s School of Computing and Engineering, has found that ‘decentralisation’ – the foundation of…