Page 4,470«..1020..4,4694,4704,4714,472..4,4804,490..»

New internet security device launched to safeguard schools against child abuse – Phys.Org

February 20, 2017 by Andrew Merrington Credit: University of Plymouth

Computer experts at the University of Plymouth have created a new device that provides round-the-clock monitoring against online child abuse and radicalisation for primary and secondary schools.

ICAlert plugs straight into a school's network, checks all web traffic, and immediately generates an alert if there is any attempted access of illegal material, such as child abuse images, terrorist material or extremism websites.

The University is now working with South West Grid for Learning (SWGfL) and the Internet Watch Foundation (IWF) to offer the safeguarding service for schools across the region, and SWGfL has seconded specialist police officers with extensive experience at handling child pornography offences to be the points-of-contact.

The technology has been developed by academics within the School of Computing, Electronics and Mathematics. Bogdan Ghita, Associate Professor of Computer Networks, co-led the project with Paul Dowland, until recently Associate Professor of Information Systems Security, now of Edith Cowan University, Perth, Australia.

Bogdan said:

"The challenge was to encapsulate the service offered by SWGfL in a self-contained, reliable and affordable box that required minimal set up and no input thereafter. The resulting solution brings together hardware that connects seamlessly into a school's network infrastructure, with efficient software that delivers the required analysis. ICAlert offers long-term, effective monitoring of a school's network and is flexible enough to deal with increasing internet traffic or number of users."

The low-cost devices are supported by the Counter Terrorism Internet Referral Unit (CTIRU) and manufactured by Cornwall firm Selectronics Limited. Once plugged into a school's network, the device is ready to use and requires no additional management by the school. The tool receives periodic updates that include the latest list of banned web content links, as published by the Internet Watch Foundation, in an encrypted format. It is against this list that ICAlert compares internet traffic at the school.

The team say it provides an alternative solution to 'filtering', where access to banned sites is simply denied and the attempt to perpetrate an offence goes unnoticed.

South West Grid for Learning (SWGfL), and the Internet Watch Foundation (IWF) under a Home Office regulated project, have been piloting this alerting capability (for illegal content) with its connected schools since 2006.

David Wright, Chief Executive at SWGFL, said:

"Over this period there have been a number of alerts that have led to successful prosecutions and the removal of potential threats to children and wider school communities. This is something that SWGfL is particularly proud of, and ICAlert now extends this alerting capability to any school firstly in the region and potentially nationally thereafter."

Explore further: New research lifts the lid on 'sexting' attitudes and practices amongst teenagers

A new study conducted by Plymouth University and UK Safer Internet Centre supported by the NSPCC, reveals new concerns and trends in 'sexting' amongst teenagers.

Major US Internet firms have joined an effort to curb the spread of images of sex abuse of children, organizers said Monday.

Billions of fitness trackers, medical implants, surveillance cameras, home appliances, thermostats, baby monitors and computers in automobiles now are connected as part of a rapidly expanding "internet of things."

As an increasing number of devicesfrom cars to light bulbs to kitchen appliancesconnect with computer networks, experts are raising concerns about privacy and security. Just this fall, attackers used compromised home ...

Oracle on Monday announced it is buying Dyn, a Web traffic management firm recently hit with a cyber attack that closed off the internet to millions of users.

The increasing availability of mobile phones and tablets to school children is forcing schools to reconsider their approach to web filtering as students abandon controlled campus networks for public wireless.

Chinese telecoms giant ZTE unveiled Sunday what it said is the world's first smartphone compatible with the lightening-fast 5G mobile internet service that networks expect to have up and running by 2020.

Jeff Regan was born with underdeveloped optic nerves and had spent most of his life in a blur. Then four years ago, he donned an unwieldy headset made by a Toronto company called eSight.

The race to develop self-driving vehicles took a new turn on Thursday when Google's parent company Alphabet filed a lawsuit against Uber, accusing it of stealing technology.

Battery-operated medical devices implanted in human bodies have saved countless lives. A common implant, the cardioverter defibrillator, sends a jolt of electricity to the heart when needed, preventing a heart attack or heart ...

Car shopping isn't just about kicking the tires anymore. It's also about testing the technology.

Today, researchers at the Dutch research institute CWI and Google jointly announce that they have broken the SHA-1 internet security standard in practice. This industry standard is used for digital signatures and file integrity ...

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Read more here:

New internet security device launched to safeguard schools against child abuse - Phys.Org

Read More..

Your Guide to the Encryption Debate – Consumer Reports – ConsumerReports.org

Encryption could soon become part of national debates over consumer issues ranging from data breaches to the safety of connected cars.

Not long ago, it was the sort of thing that only bankers, spies, and military leaders worried about. But, in today's digital world, encryption has become part of our everyday lives, protecting our ability to shop online, book flights, and hold private conversations.

According to Mozilla, the open-internet advocacy group that created the Firefox browser, 49.5 percent of global web traffic is now encryptedan increase of more than 10 percent in one year.

While security experts applaud that progress, they'd like to see even more encryption, to cut down on data breaches, identity theft, and the sort of hacks that could perhaps threaten the nation's power plants.

But not everyone views encryption as a force for good. For law enforcement officials, it's also a tool that allows thieves and terrorists to escape detection.

With a new administration in the White House, one vocal about fighting crime and stamping out terrorism, the debate over encryption's merits may soon surface once again.

Encryption may be central to many everyday transactions, but the issues can be tough to follow. Heres your cheat sheet.

Originally posted here:

Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org

Read More..

Google helps put aging SHA-1 encryption out to pasture – Engadget

Breaking SHA-1 has been a goal of security users for quite a while, so it's quite a feather in Google's cap to be first. (It's possible, though, that the NSA, Russians or others have had one that they've kept under wraps.) The team said that the collision "is one of the largest computations ever completed," so Google's cloud infrastructure was an indispensable part of that.

There's no great danger for users. Google Chrome, Microsoft's Edge, Firefox and all other major browsers flag HTTPS sites that use SHA-1 as insecure with a big red warning -- so very few use it for verifying digital content. The team won't release the attack (Dad-jokingly called "SHAttered") for 90 days, in order to give affected sites time to deal with it.

Also, even though Google has made it 100,000 times faster to crack an SHA-1 certificate, it would still require some serious computing horsepower to do so. Google says it requires 12 million GPUs a full year to brute force a certificate, while the SHA-1 "Shattered" attack takes just 110 GPUs. For now, however, you'd still need a supercomputer or server farm (or a bot farm) to crack one in a reasonable amount of time.

As a proof of concept, Google is hosting two PDFs with the different content but the same hash, and has supplied the public with a free detection app. It had a lot of motivation to be first with a collision. It led the movement to deprecate SHA-1 because it's advertising business relies heavily on secure sites and ad platforms -- making the discovery a giant "I told you so" of sorts.

Continued here:

Google helps put aging SHA-1 encryption out to pasture - Engadget

Read More..

Top 6 Data Encryption Solutions – The Merkle

People who take computer security seriously will acknowledge they need to encrypt data and create regular backups. Luckily, there are quite a few solutions that allowfor both things at the same time. Below is a brief list of tools specializing in data encryption. Do keep in mind this list is not complete, but merely serves as an indicator asto what one should look for in such a software solution.

Encrypting computer data and protecting the device in question can all be achieved by using the Digital Guardian software kit. Keeping sensitive information safe from harm is thenumber one priority. Moreover, the toolkit focuses on data activity and enforcing user policies. This is a quite powerful solution for both consumers and enterprises, albeit it is more tailored towards the latter.

Kryptel is one of the many consumer-oriented encryption tools that provides a lot of convenience. In a matter of a few clicks, users can easily encrypt thousands of files on their personal computer. Data-wiping security can be enabled as well, which may be a nifty feature for some users. The free tool offers all of this functionality, whereas the paid version adds a command-line interface and encrypted backups.

Open-source solutions in the way of data encryption are not hard to come by, yet few of them make a big name for themselves. Ciphershed is one of those rare exceptions, which is completely free of charge to use. It is capable of encrypting files and entire drives, as well as removable storage. It includes a wizard guiding both novice and advanced users through this entire process, which is appreciated by a lot of people. It is a very potent solution that will suit most peoples needs.

Three different versions of SecureDoc exist in the world today, one of which is designed specifically for the Windows operating system. SecureDoc offers encryption tools for computers, laptops, and removable media. Users can encrypt files, folders, and entire disks in a matter of clicks. The companys other two solutions focus on the Enterprise and Cloud sector, which are worth checking out as well.

Another open-source program available to consumers around the world goes by the name of AES Crypt. With a 256-bit encryption algorithm, AES Crypt is one of the most powerful free solutions to date. Encrypting data requires a file name and password, which is also used for decrypting information later on. AES Crypt works across Windows, Linux, and Mac OS X devices, AES Crypt has become somewhat of a standard among computer users over the past few years.

Last but not least, there is the VeraCrypt open-source encryption solution. Its main purpose is to protect files and computer systems against data theft and information leaks, both of which are very common threats these days. VeraCrypt can be used to encrypt hard drive partitions, as well as the entire system. Moreover, it is a powerful brute-force attack solution, which can go a long way in this day and age of cyber crime.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

See the original post:

Top 6 Data Encryption Solutions - The Merkle

Read More..

Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption – XDA Developers (blog)


XDA Developers (blog)
Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption
XDA Developers (blog)
For a while, users of the Android app could only send messages over the default TLS encryption (enabled by default), but in version 7.2 of the Gmail application, it appears that support for sending messages with this enhanced S/MIME encryption may soon ...

More here:

Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog)

Read More..

Bitcoin Prices Have Surged to an All-Time High – Futurism

In Brief

Bitcoinis a term we often hear tossed around in the headlines. We know that it deals with money, online transactions, and just maybe the deep web. Back in 2014, the Washington Postestablished that only 24% of theAmerican public was aware of what bitcoin actually was. Meaning that almost three-quarters of the country had no idea. But maybe they just might want to start paying attention, especially now since it is at its all-time high value.

Bitcoin was introduced in 2008 by an anonymous group of programmers under the name of Satoshi Nakamotoand was eventually released to the public in 2009 as an open-source software. Unlike other online payment services like PayPal and Venmo, Bitcoin is a peer-to-peer network that takes place privately between two usersmeaning there is no intermediary involved. The cryptographic virtual currency is completely decentralized from any external influence while all transactions with the currency are accounted for through ablockchain ledger.

While bitcoin is thoroughly anonymous, the blockchain ledger has all transactions available publicly. Therefore, theoretically, if you know the time and date of a particular transaction, you may be able to match someones online address to their identity. On the other hand, all transactions made through bitcoin are encrypted with military grade cryptography, ensuring that all deals are secure. Sending and receiving bitcoins is as easy as sending an email, but does that mean its worth it?

With all that said and done, Bitcoin has made it far since its substantial price drop in 2013. Since then Bitcoin has stabilized around a margin of $250, with most experts believing it was doomed. However, it seems to have returned to a relatively stable rise since last year. This time last year bitcoin was valued at $367, with its steady rise,it is now valued at 1,177.18. Many speculate as to what is causing the recent trend from Congress to WallStreet to even sheer luck.

More:
Bitcoin Prices Have Surged to an All-Time High - Futurism

Read More..

CloudBleed Data Leak Is A Big Threat To Bitcoin Platforms – The Merkle

Bitcoin users need to be well aware of the recent CloudFlare issue, as it affects quite a few different cryptocurrency-related services. Several companies issued warnings regarding CloudBleed, all of whom advise users to change their passwords. With so many exchanges relying on CloudFlare, this is another example of why centralization needs to be avoided.

To put the CloudBleed security issue into perspective, the scope of services affected by this data leak extends well beyond the bitcoin space. It is believed the data leak exposes thousands of passwords and other personal information for several months until it was discovered. Cloudflare managed nearly 10% of all web traffic, which makes it one of the backbones of the internet, so to speak. Unfortunately, this also means virtually every popular service is affected by this data leak.

Among the information being leaked to anyone who requested it are passwords, cookies, messages, and any other type of personal information one can think of. The bug was discovered in September of 2016, yet no further specific details were provided to us at this time. We do know the list of clients affected by CloudBleed is a lot larger than most people would think possible.

Security analysts at Googles Project Zero noticed an overflow error that could leak sensitive information to search engines and other platforms scraping data from the internet. This opens up a treasure trove of financial information to hackers and other criminals looking to take advantage of it. It is unclear if any of this information was obtained by hackers, but it seems very plausible that is the case.

Cloudflare CEO Matthew Prince is confident the issue was fixed before someone could even take advantage of the flaw. That is a rather bold and positive statement, although it wont necessarily put peoples minds at ease. Various bitcoin companies issued warnings to their users to change their password immediately, as that remains the best course of action. Moreover, any platform where the same password was used will need to have the credentials updated as well.

The list of affected bitcoin companies is rather long and includes virtually every platform most users ever come in contact with. Popular exchanges, such as Coinbase, BTC-E, QuadrigaCX, Kraken, Bitstamp, and Bitfinex, for example, are all using Cloudflare for their Anti-DDOS protection. All of these companies advised users to update their password sooner rather than later. LocalBitcoins is also affected, even though the platform does not act as a custodian for funds. Then again, having someone steal your account and scamming users is still a real threat.

This event goes to show multiple companies relying on one and the same anti-DDoS provider is a big problem. Especially in the world of bitcoin and decentralization, a more distributed solution is direly needed. CloudFlare has built a strong reputation over the past few years, but this data leak highlights the problem of centralization. All bitcoin users relying on a service affected by this leak need to update their login credentials as soon as possible, that much is certain.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read more:
CloudBleed Data Leak Is A Big Threat To Bitcoin Platforms - The Merkle

Read More..

Bitcoin charity platform Helperbit completes first case study – Brave New Coin

In the last few months devastating earthquakes have hit central Italy, devastating many mountain villages, killing nearly 300 people and displacing 22 thousand inhabitants. The environmentalist association Legambiente, and several partners, have since been collaborating on a crowdfunding campaign for those affected.

Legambiente (League for the Environment) is the most widespread environmental organization in Italy, with 20 Regional branches and more than 115,000 members. It is acknowledged as association of environmental interest by the Ministry of the Environment; it represents the UNEP National Committee for Italy, it is one of the leading member of the European Environmental Bureau, and of IUCN - the World Conservation Union.

The bitcoin based campaign was Legambientes first foray into bitcoin donations, thanks to Helperbit. 59 percent of the campaigns goal, over eight bitcoins, have already been raised. Five of those bitcoins were donated by insurance giant Swiss Re.

- Helperbit

Helpbit is an Italian startup that uses Blockchain technology to allow people to donate digital and local currencies to charities and people in need all over the world, while tracking the donations and the manner in which they are used.

The company co-founders Guido Baroncini Turricchia, Davide Gessa, Davide Menegaldo, Roberto Tudini, Vincenzo Agu and Gianluca Carbone, initially came up with the idea for their platform in 2009, after reading news about the ineffective management of charitable funds following the 2009 LAquila earthquake in Italy.

In 2012, the Italian il Fatto Quotidiano reported that the five million euros donated by Italians to help with building reconstruction were transferred to a guarantee fund, which locked up the funds for nine years.

The lack of transparency that characterizes the traditional systems allows donative streams to be drained along their way to those who need it, Helperbit states. The lack of transparency puts people off donating and we want to unlock this unexpressed donative potential.

Having officially launched in 2015, Helperbit now offers a bitcoin platform that allows people to donate digital and local currencies to charities and people in need all over the world. Donors can trace the funds and the manner in which they are used, offering true transparency.

- Helperbit

The recent fundraising campaign provided a specific case study for the Helperbit platform. The campaign funds are being offered to local entrepreneurs. We want to support and promote their economic activities and finance projects presented by those that, in front of the tragedy of the earthquake, want to react, investing on new corporate initiatives in those areas, Helperbit explains.

Among the many affected locals, the earthquake in central Italy has taken away everything Ilaria and Lorenzo have. The owners of Societ Agricola Etiche Terre S.S., moved to the region less than a year ago to start the production of saffron, garlic and black truffle.

The farmers recently uploaded the first invoice on the Helperbit platform, activating a refund request from Legambiente. Much of the process is visible in the public Bitcoin Blockchain, including the proof of expenditure with a cryptographic reference to the invoice.

The document certifying the request and the transaction are now inextricably linked in the immutable and decentralized public register, giving the opportunity to verify the sender, the recipient and the justification. The process provides a higher level of transparency and increases donor participation. They know precisely how the funds are spent.

Donors should be able to decide how their donation is used. Organizations that act properly should not be affected by few bad behaviors, states Helpbit. Our aim is to offer tools that allow the system to work with a complete audit of economic flows.

Each campaign Helperbit runs uses multisignature technology. Recipients get as many multisignature keys as is appropriate for their organization. This reduces drastically the risk of theft and misuse of the donations, Helperbit explains. Donors also receive a key. Helperbit Donors can fund their accounts by either sending bitcoin or simply use their own debit cards. Organization can accept bitcoin or local currency.

The platform won second place in the iBank Challenge 2016 competition in December, taking home 11,000 after beating out all but one of the 83 contestants. The contest was promoted by the Italian Banking Association and organized by its own R&D laboratory, ABI Lab.

- Helperbit

Vaious Charities including the Red Cross and Greenpeace hace accepted bitcoins for individual fundraisers in the past, but typically they do not explore accepting bitcoin permanently as the size of the market is still too small. Unfortunately, few if any of these attempts have exposed the major charities to the technological benefits of using a blockchain.

Bitgives GiveTrack is one of very few similar attempts at tracking charity funding from donor to recipient. The platform has many of the same features as Helperbit, and has successfully run several campaigns. The Water Project raised $11,000, more than their $10,000 goal.

See the rest here:
Bitcoin charity platform Helperbit completes first case study - Brave New Coin

Read More..

Spooked by Cyber Extortion Spike, Businesses Stockpile Bitcoin – NewsFactor Network

U.S. corporations that have long resisted bending to the demands of computer hackers who take their networks hostage are increasingly stockpiling bitcoin, the digital currency, so that they can quickly meet ransom demands rather than lose valuable corporate data.

The companies are responding to cybersecurity experts who recently have changed their advice on how to deal with the growing problem of extortionists taking control of the computers.

"It's a moral dilemma. If you pay, you are helping the bad guys," said Paula Long, chief executive of DataGravity, a Nashua, N.H., company that helps clients secure corporate data. But, she added, "You can't go to the moral high ground and put your company at risk."

"A lot of companies are doing that as part of their incident response planning," said Chris Pogue, chief information security officer at Nuix, a company that provides information management technologies. "They are setting up bitcoin wallets."

Pogue said he believed thousands of U.S. companies had prepared strategies for dealing with hacker extortion demands, and numerous law firms have stepped in to facilitate negotiations with hackers, many of whom operate from the other side of the globe.

Symantec, a Mountain View, Calif., company that makes security and storage software, estimates that ransom demands to companies average between $10,000 and $75,000 for hackers to provide keys to decrypt frozen networks. Individuals whose computers get hit pay as little as $100 to $300 to unlock their encrypted files.

Companies that analyze cyber threats say the use of ransomware has exploded, and payments have soared. Recorded Future, a Somerville, Mass., threat intelligence firm, says ransom payments skyrocketed 4,000 percent last year, reaching $1 billion. Another firm, Kaspersky Lab, estimates that a new business is attacked with ransomware every 40 seconds.

"If you're hit by ransomware today, you have only two options: You either pay the criminals or you lose your data," said Raj Samani, chief technical officer at Intel Security for Europe, the Middle East and Africa. "We underestimated the scale of the issue."

Hackers often send out email with tainted hyperlinks to broad targets, say, an entire company. All it takes is one computer user in a company to click on the infected link to allow hackers to get a foothold in the broader network, leading to hostile encryption.

"At least one employee will click on anything," said Robert Gibbons, chief technology officer at Datto, a Connecticut company that offers digital disaster recovery services.

Law enforcement counsels U.S. businesses not to succumb to ransom demands, urging them to keep backup copies of their data in case of hostile encryption.

"The official FBI policy is that you shouldn't pay the ransom," said Leo Taddeo, chief security officer for Crypt-zone, a Waltham, Mass., company that provides network security. Until 2015, Taddeo ran the cyber division of the FBI's New York City office.

But practical considerations increasingly are dictating a different approach. "It's an option to pay the ransom to get back up and running. Sometimes it's the only option," Taddeo said.

"But it has downsides," he added. "Paying ransom just invites the next attack."

Moreover, 1 in 4 companies that pay ransoms never get their files restored, Gibbons said.

The idea of rewarding extortionists with payment makes some technologists see red.

"That makes me super mad," said Lior Div, chief executive of Cybereason, a Boston-area cybersecurity company. "There are things that are unacceptable, and we need to fight them."

Div and his company have done something about the extortion epidemic. They built a product called RansomFree that claims to detect 99 percent of all ransomware strains.

So far, the free software has been downloaded 125,000 times, the company says.

As extortionists get more sophisticated, researchers say, they are modifying their malicious code, their infection strategies and the way they collect payments.

Once they weasel their way into your network, they now take a look around.

"They'll actually explore your system to see how much money they can squeeze from you," said Andrei Barysevich, director of advanced collection at Recorded Future.

And they won't offer any sympathy, no matter how valuable the encrypted data, even if lives are at stake, say, in a health care network. They may even say they are doing nothing evil.

"They actually think they are on the moral high ground. They think the companies should have paid more for security," said Barysevich, who spoke at a presentation this week at the annual RSA cybersecurity conference in San Francisco, which bills itself as the world's leading gathering of cybersecurity specialists.

One of the reasons midsize and large companies are storing bitcoin for emergency use is that extortionists, once they succeed at penetrating a system, commonly give a deadline for payment before destroying data. But victims can't rush out and buy bitcoin in a day or two.

"It takes at times a week for (brokers) to process you," Barysevich said.

Setting up the wallet ahead of time, Pogue said, allows businesses an option that is quick, although perhaps repugnant.

"If they need to go to it, they are not spinning their wheels standing up a bitcoin wallet," Pogue said.

2017 The Star Democrat under contract with NewsEdge/Acquire Media. All rights reserved.

More here:
Spooked by Cyber Extortion Spike, Businesses Stockpile Bitcoin - NewsFactor Network

Read More..

Top 4 Poor Countries Where Bitcoin may not Make an Impact – The Merkle

Bitcoin is often touted as a solution that can make an impact in countries dealing with financial hardship. Poor countries are not difficult to come by, all of which can benefit tremendously from using bitcoin in one way or another. Below are the top poorest countries in the world, albeit it remains unclear if they will ever embrace cryptocurrency to improve their financial status.

It will come as no surprise to find out there are quite a few African countries with very low GDP. Central African Republic takes the crown in this regard, although that is nothing to be happy about by any means. Even the countrys mineral deposits and uranium reserves as well as oil, gold, lumber and hydropower are not improving the regions financial status by any means. It has the second-lowest level of human development in the world. Only 3% of the population uses the internet as of 2012, which may not spell a bright future for bitcoin by any means.

Formerly known as Belgian Congo and Zaire, the Democratic Republic of the Congo has fallen on hard time for many decades now. The Congolese Civil Wars, which date back to the second half of the nineties, left the country torn by war. Political instability has had a disastrous effect on the local economy.

Its internet population only represents 1.7% of the entire country, although that number has been rising steadily. Interestingly enough, there are close to 200 ISPs in this country. All of this is not necessarily enough to get bitcoin off the ground in the Democratic Republic of the Congo anytime soon, but it only takes a few people with enough passion to push the bitcoin agenda in this country.

One African country rarely making positive headlines this past decade is Burundi. This is also one of the smallest countries in all of Africa, yet is mostly known for its civil unrest which started back in April of 2015. Deposing the President of Burundi ultimately failed, yet the unrest has not quieted down by any means. Once again, it is politics driving the economy into the ground, which is somewhat of a common theme in Africa these days.

Considering how the country is poor on resources to begin with, it is not hard to see why these struggles exist. Agriculture employs over 90% of the population, yet only represents 30% of GDP. Burundi has made significant investments in their high-speed internet network, which could spell a positive future for bitcoin adoption in the region. Right now, only 1.5% of the population are connected tot he World Wide Web.

While Liberia is doing slightly better than the other three countries mentioned in this list, the situation is still dire. With the Civil War destroying most of the economy in the country and external debt surpassing 800% of GDP, things are not looking great. With 3.8% of the population connect to the internet, bitcoin could make somewhat of an impact over the next few years, although it will be not an easy battle.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Excerpt from:
Top 4 Poor Countries Where Bitcoin may not Make an Impact - The Merkle

Read More..