<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>HYDRA &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/hydra/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 03 Jun 2021 11:18:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>How do criminals turn crypto into cash?</title>
		<link>https://en.spress.net/how-do-criminals-turn-crypto-into-cash/</link>
		
		<dc:creator><![CDATA[Linh Đỗ]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 11:18:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoin Fog]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[cash]]></category>
		<category><![CDATA[CHAINLYSIS]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[criminals]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ELLIPTIC]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Exchanges]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[HYDRA]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[King Law Firm]]></category>
		<category><![CDATA[Michael Phillips]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Tom Robinson]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[Turn into]]></category>
		<category><![CDATA[VMWARE]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-do-criminals-turn-crypto-into-cash/</guid>

					<description><![CDATA[In the world of cybercrime, cryptocurrency is the preferred form of payment. But ultimately, criminals still need to convert electronic assets into cash. According to the Financial Times When it comes to converting cryptocurrencies into cash, criminals often go to the Treasure Men group. To contact this group, simply go to the Hydra dark web. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the world of cybercrime, cryptocurrency is the preferred form of payment. But ultimately, criminals still need to convert electronic assets into cash.</strong><br />
<span id="more-20294"></span> According to the <em> Financial Times</em> When it comes to converting cryptocurrencies into cash, criminals often go to the Treasure Men group. To contact this group, simply go to the Hydra dark web. It is the largest online marketplace on the dark web by revenue.</p>
<p> &#8220;This group leaves cash in specific places &#8211; behind a bush or under a bus seat &#8211; for criminals to get. They send specific location instructions. This is a whole new profession.&#8221; <em> Financial Times</em> quoted Dr. Tom Robinson, founder of Elliptic organization specializing in analyzing cryptocurrency transactions. The dark web site Hydra (Russian) offers a variety of methods for criminals to exchange cryptocurrency for cash, for example exchanging Bitcoins for gift certificates, debit cards or iTunes vouchers. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/7fddf4c8e38a0ad4539b.jpg" width="625" height="413"> <em> Special software is required to access the Hydra dark web. Photo: ZDNet. </em> <strong> Anonymous but still leaving traces</strong> According to experts, the ability to store cryptocurrency without providing an identity makes this currency especially attractive to many criminal gangs, especially hackers specializing in breaking into networks of businesses. and demand ransom. Statistics from research firm Chainalysis show that in 2020, businesses and organizations paid at least $350 million in cryptocurrency ransoms to a number of hacker groups, including DarkSide, the group that attacked the pipeline system. Colonial Pipeline earlier this month. But while anonymous, cryptocurrency transactions are recorded on an immutable blockchain system, leaving a clear trail for anyone with any knowledge of the technology. A number of investigative firms have been established to assist national authorities in tracking various criminal gangs by analyzing the flow of cryptocurrency transactions. Chainalysis (headquartered in New York, USA) is one such company. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/70cce6d9f19b18c5418a.jpg" width="625" height="315"> <em> Binance cryptocurrency exchange. In 2011-2019, cryptocurrency exchanges supported the conversion to cash of about 60-80% of Bitcoin transactions by criminal groups. Photo: Binance. </em> Chainalysis raised $100 million in its initial public offering, reaching a valuation of over $2 billion. There are also Elliptic (headquartered in London, UK) and CipherTrace, a company supported by the US government. Chainalysis said that in 2020, some illegal organizations receive about 5 billion USD and transfer 5 billion USD to other organizations. This represents almost 1% of all global crypto flows. Initially, the criminals only withdrew funds through major cryptocurrency exchanges. Elliptic estimates that between 2011 and 2019, cryptocurrency exchanges supported the conversion of about 60-80% of Bitcoin transactions by illegal organizations into cash. <strong> Take advantage of crypto ATMs</strong> Since last year, exchanges have been concerned about the tightening of regulations by many governments, so they have begun to apply anti-money laundering (AML) and customer identity verification (KYC) processes. This change pushes criminals to unlicensed exchanges. Still, expert Michael Phillips of online insurance company Resilience said that unlicensed exchanges have low liquidity, making it difficult for criminals to convert crypto to fiat. &#8220;The goal is to make it more expensive for criminals to convert money,&#8221; he explained. However, criminals still have a way around. Research by Chainalysis shows that some intermediaries are quietly assisting gangs in conducting many illegal money conversion transactions. Meanwhile, small-scale transactions still flow through more than 11,600 crypto ATMs worldwide without any control, or through gambling sites that accept crypto payments. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/98e80cfd1bbff2e1abae.jpg" width="625" height="351"> <em> Criminals can use crypto ATMs to get cash. Photo: EPA. </em> Faced with that situation, crypto security companies use the technology of analyzing blockchain transactions and intelligence to determine which crypto wallets belong to criminal gangs. At the same time, they provide an overview of the global crypto crime ecosystem. As a result, companies discovered that many hacker groups lease ransomware to criminal networks. Kimberly Grauer, director of research at Chainalysis, said hackers also pay support services to other criminal groups in cryptocurrency. Thus, a criminal cryptocurrency ecosystem has been formed on a global scale. &#8220;We were able to see the ransom transactions, how the gangs split the money and how that money went to groups in the system,&#8221; Grauer said. <strong> The tricks are getting more and more sophisticated</strong> However, cybercriminals are increasingly using a variety of high-tech tools to obscure the traces of cryptocurrency transactions. Some criminals use &#8220;chain-hopping&#8221; &#8211; repeatedly switching between different cryptocurrencies &#8211; to avoid the eyes of security companies. In addition, they use a “privacy cryptocurrency” like Monero, which has a high degree of anonymity. Another tool commonly used by criminals is a “mixer,” a third-party service that mixes illegal cryptocurrencies with clean money, before pushing them back onto the market. In April, the US Department of Justice arrested a Swedish citizen of Russian origin, who specialized in operating a &#8220;mixing&#8221; service called Bitcoin Fog. During the past 10 years, this guy has transferred a total of 335 million USD in Bitcoin. Governments need to modernize confiscation and asset freezing processes to make it easier to confiscate cryptocurrencies from exchanges. <strong> Tom Kellerman, director of cybersecurity strategy at VMware V</strong> “It is possible to untangle mixed cryptocurrencies. However, that requires high technology and a lot of processing and data power,” said Katherine Kirkpatrick, director of law firm King &#038; Spalding. According to Elliptic, the popular 2020 coin mixers are highly anonymous &#8220;personal wallets&#8221;. They supported 12% of Bitcoin wash transactions last year. Tom Kellerman, director of cybersecurity strategy at VMware and a member of the US Secret Service&#8217;s advisory board, said that governments need to modernize the process of confiscating and freezing assets for law enforcement. easily confiscate cryptocurrencies from exchanges. In the past, blockchain security experts have floated the idea of ​​sharing a &#8220;blacklist&#8221; of crypto wallets used by criminals with exchanges, analytics firms, and governments. “Now is the right time to consider that initiative.” <em> he </em> Kemba Walden of Microsoft&#8217;s Digital Crimes Unit.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20294</post-id>	</item>
		<item>
		<title>Wireless tissue transplant technology</title>
		<link>https://en.spress.net/wireless-tissue-transplant-technology/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 15 May 2021 11:15:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[chip]]></category>
		<category><![CDATA[Conductor]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[Engineer]]></category>
		<category><![CDATA[Generator]]></category>
		<category><![CDATA[HYDRA]]></category>
		<category><![CDATA[IEEE]]></category>
		<category><![CDATA[Implant]]></category>
		<category><![CDATA[Millimeters]]></category>
		<category><![CDATA[Program]]></category>
		<category><![CDATA[Rice University]]></category>
		<category><![CDATA[Rodents]]></category>
		<category><![CDATA[Sciatic nerve]]></category>
		<category><![CDATA[Shui ie]]></category>
		<category><![CDATA[Spinal cord]]></category>
		<category><![CDATA[Stimulate]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tissue]]></category>
		<category><![CDATA[transplant]]></category>
		<category><![CDATA[Veer]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[Yang]]></category>
		<guid isPermaLink="false">https://en.spress.net/wireless-tissue-transplant-technology/</guid>

					<description><![CDATA[Previously, engineers from Rice University (USA) developed an implantable device to electrically stimulate patients with spinal cord injuries. Recently, the team upgraded the technique to power and program the multipoint biostimulator from a single transmitter. Thanks to new research, electrical and computer engineer Kaiyuan Yang and colleagues at the George R. Brown School of Engineering [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Previously, engineers from Rice University (USA) developed an implantable device to electrically stimulate patients with spinal cord injuries.</strong><br />
<span id="more-14618"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_181_38828179/392e879c98de718028cf.jpg" width="625" height="414"> </p>
<p> Recently, the team upgraded the technique to power and program the multipoint biostimulator from a single transmitter. Thanks to new research, electrical and computer engineer Kaiyuan Yang and colleagues at the George R. Brown School of Engineering (Rice University) won an award at the Society of Electrical and Electrical Engineers&#8217; Custom Integrated Circuits Conference death (IEEE). The researchers performed experiments showing that an alternating magnetic field can be controlled by a battery-powered generator outside the body. The transmitter can be mounted on a belt or harness, powering and programming two or more implants at least 60 millimeters away. The implant can be programmed with a delay measured in microseconds. That could allow them to coordinate the activation of multiple wireless pacemakers in individual heart chambers, says engineer Yang. “Our study shows that it is possible to program the implants to stimulate in a coordinated pattern. We sync every device, like a symphony. That gives us a lot of scope in stimulant treatments, whether it&#8217;s for the heart rhythm or the spinal cord.&#8221; The scientists also experimented using small implants. Each tissue is about the size and weight of a vitamin. Experiments performed on hydra vulgaris rodents have demonstrated that, for at least a short distance, such devices can stimulate two separate hydras to contract. Then, activate a fluorescent tag to respond to electrical signals and respond at controlled amplitudes along the rodent&#8217;s sciatic nerve. “A study on spinal cord regeneration showed that multipoint stimulation in a certain pattern helps restore the nervous system. Several clinical studies are underway, but all are using desktop devices. There is no implantable tool that can do this,&#8221; said engineer Yang. Lab devices, called MagNI (for electromagnetic nerve implantation). MagNI was introduced early last year as a cordless spinal cord stimulator for power and programming. That means the wire does not need to be passed through the patient&#8217;s skin. Because, putting the wire through the skin is a method that can cause infection.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14618</post-id>	</item>
	</channel>
</rss>