Tuesday, January 31, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

SourceHut to remove all cryptocurrency-related projects

Researcher by Researcher
November 2, 2022
in Cybersecurity
0
SourceHut to remove all cryptocurrency-related projects
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Also including blockchain-related projects in the ban, SourceHut’s creator said the technology is associated with fraudulent activities and high-risk investments.

crypto currency concept
Image: lucadp/Adobe Stock

More about Innovation

Open-source repository SourceHut is pulling the plug on software projects that tap into cryptocurrency and blockchain. In a post published on Monday, Oct. 31, SourceHut founder and creator Drew DeVault said he would ban projects associated with these technologies, citing their use in “get-rich-quick” schemes and other types of scams.

DeVault explained his decision by asserting that domains used in these types of projects are associated with “fraudulent activities and high-risk investments” that take advantage of people during difficult economic times and an inequality in global wealth.

SEE: Metaverse cheat sheet: Everything you need to know (free PDF) (TechRepublic)

Why SourceHut is dropping crypto and blockchain projects

“Few to no legitimate use-cases for this technology have been found; instead it is mostly used for fraudulent ‘get-rich-quick’ schemes and to facilitate criminal activity, such as ransomware, illicit trade and sanctions evasion,” DeVault said. “These projects often encourage large-scale energy waste and electronics waste, which contributes to the declining health of Earth’s environment.

“The presence of these projects on SourceHut exposes new victims to these scams and is harmful to the reputation of SourceHut and its community.”

Since Bitcoin burst onto the scene more than 10 years ago, cryptocurrency has been a hot commodity among many investors and institutions, rewarding those savvy few with healthy profits. However, the virtual currency has earned a black eye among its many critics. Some fault cryptocurrency for its high-risk and speculative nature, questioning its long-term viability. Others point to the ways that cryptocurrency has been exploited in scams and fraud.

Used to purchase Bitcoin, Ethereum and other forms of cryptocurrency, blockchain acts as a shared database to keep track of the various transactions. Though DeVault acknowledged that the basic concept of a blockchain can be useful, he said that projects that market this technology are “subject to the same social ills as cryptocurrency.” As such, blockchain-related projects are being included in the ban.

What can software developers with SourceHut-hosted blockchain and cryptocurrency-related projects do?

DeVault said the ban would be applied with some discretion, which means developers who feel their use of cryptocurrency or blockchain “is not plagued by these social problems” can request permission to host it on SourceHut or appeal its removal by contacting support. Otherwise, they have until Jan. 1, 2023, to migrate a banned project to a different platform.

SourceHut users and developers who’ve kept up with DeVault’s blog posts over the past couple of years shouldn’t be too surprised by the decision. The SourceHut founder has made no secret of his disdain for cryptocurrency, calling it “an abject disaster” and “one of the worst inventions of the 21st century” in a post from April 2021. Citing some of the tactics used by cryptocurrency scammers and fraudsters, DeVault said the integrity and trust of the software industry has declined as a result.



Source link

Related articles

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
Tags: cryptocurrencyrelatedProjectsremoveSourceHut
Share76Tweet47

Related Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
0

VMware has released updates for a group of four vulnerabilities in its vRealize Log Insight logging platform, three of which...

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
0

There are many organizations moving to the cloud every day. Some are developing software at a fast pace, some are...

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

January 30, 2023
0

On Friday, January 20, 2023, Google announced it would lay off 12,000 employees. Amazon and Microsoft have laid off a...

How IT Budgets Should Fill Cybersecurity Moats in 2023

How IT Budgets Should Fill Cybersecurity Moats in 2023

January 30, 2023
0

TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity —...

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

January 30, 2023
0

Today, data is considered the new oil and rightly so because the amount and type of data collected on people...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023

Recent Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved